Latest showcases

More showcases...
6 tips to prevent online fraud from sinking your business
6 tips to prevent online fraud from sinking your business

The success of the recent Black Friday and Cyber Monday weekend is testament to the opportunity offered by digital commerce. But local entrepreneurs should not underestimate the threat of online fraud...

By Brendon Williamson 1 day ago

The burning platform for data security and compliance
The burning platform for data security and compliance

"We have connected all of our lives - personal, professional and national - to the internet. That's where the bad guys will go because that's where our lives are, our money, our secrets"...

By Gavin Meyer 5 Dec 2018

Adding threat intelligence to the security mix
Adding threat intelligence to the security mix

Today's threat landscape is so complex and fast-paced, it is impossible to prevent every threat or attack...

By Simon Campbell-Young 26 Nov 2018

Privacy vs Profit: Will 2019 be the year of consumer paranoia?
Privacy vs Profit: Will 2019 be the year of consumer paranoia?

On the surface of our tech-dependent lives, all appears to be wonderfully beneficial and benign...

By Colin Thornton 26 Nov 2018

Why privacy and security matter
Why privacy and security matter

The 2018 Data Threat Report from Thales and 451 Research found that only 13% of organisations will not be impacted by privacy regulations...

By Jayson O’Reilly 23 Nov 2018

The specialised security concerns of OT networks
The specialised security concerns of OT networks

As with traditional IT networks, Operational Technology (OT) networks are undergoing a digital transformation process of their own...

By Doros Hadjizenonos 13 Nov 2018

British Airways highlights need for GDPR compliance
British Airways highlights need for GDPR compliance

Earlier this year, Liberty Life became one of the first global firms to suffer a major breach under General Data Protection Regulation (GDPR)...

By Gary Allemann 7 Nov 2018

Digital forensics is crucial to the security chain
Digital forensics is crucial to the security chain

The past decade has seen developments in technology that were previously unimagined. However, they have also become tools for cybercriminals...

By Simon Campbell-Young 6 Nov 2018

How CISOs can maintain corporate privacy
How CISOs can maintain corporate privacy

Today's workforce is increasingly comprised of millennials and other tech-savvy individuals that are accustomed to using technology in every aspect of their lives. As new technology emerges...

By Doros Hadjizenonos 6 Nov 2018

Why are CIOs and CISOs positions becoming more challenging?
Why are CIOs and CISOs positions becoming more challenging?

CIOs and CISO's across industries are regularly moving between positions and companies because of a common mistake...

By Pieter Engelbrecht 31 Oct 2018

App permissions can be used to exploit your data
App permissions can be used to exploit your data

Every time an application is installed on a device, the user is asked to allow that app certain permissions...

By Simon Campbell-Young 26 Oct 2018

Doros Hadjizenonos is Regional Sales Director Southern Africa at Fortinet
Recognising and preventing modern cyber scams

When it comes to protecting yourself and your organisation against cyber scams, there's no "one-size-fits-all" solution...

By Doros Hadjizenonos 22 Oct 2018

Closing the skills gap with cybersecurity training
Closing the skills gap with cybersecurity training

To close the skills gap, organisations and academic institutions must take proactive measures...

By Doros Hadjizenonos 12 Oct 2018

Non-compliance: leading organisations down the rabbit hole
Non-compliance: leading organisations down the rabbit hole

PwC's latest Global Economic Crime and Fraud Survey 2018 ranks South Africa as the second most targeted country in the world when it comes to cyber attacks...

By Simeon Tassev 10 Oct 2018

Basic cyber hygiene practices that go a long way
Basic cyber hygiene practices that go a long way

As mobile computing - especially using personal devices - becomes more common, the potential for network compromise is increasing...

By Doros Hadjizenonos 9 Oct 2018

Building credibility in a fast-moving ICT sector
Building credibility in a fast-moving ICT sector

In today's ICT business landscape, credibility is hard to achieve and even harder to maintain in the long run...

By Steve Briggs 5 Oct 2018

Source:
Why SMEs should be looking at cyber insurance

Budgets are tight and owners constantly have to prioritise spending. An expense like cybersecurity and thoughts of the nebulous world of cybercrime might be...

By Colin Thornton 28 Sep 2018

#GartnerSYM: The next phase of digital transformation
#GartnerSYM: The next phase of digital transformation

Digital business transformation is upon us. Enterprises, small and large, have recognised the power of tech to transform their ability to deliver value. But where do we go from here?

By Evan-Lee Courie 17 Sep 2018

Human error: the main cause of data breaches
Human error: the main cause of data breaches

With news headlines regularly announcing a new data breach, one wonders whether hackers are becoming more skilled or...

By Drew van Vuuren 4 Sep 2018

IoT in your home: what are the risks?
IoT in your home: what are the risks?

Smart homes are getting even smarter, with IoT devices rapidly coming to market to make homes more efficient and daily life more convenient, but...

By Doros Hadjizenonos 3 Sep 2018

Rethinking your business network
Rethinking your business network

Most companies today are on a digital transformation journey...

By Riaan Graham 28 Aug 2018

Why your future digital ID should harness blockchain technology
Why your future digital ID should harness blockchain technology

In the aftermath of the far-reaching Facebook-Cambridge Analytica data scandal and other, large-scale data leaks, it is undoubtedly time to adopt a more proactive approach...

By Colin Thornton 23 Aug 2018

SA needs to prioritise STEM education
SA needs to prioritise STEM education

South Africa already faces well-known challenges in its education system, felt nowhere more strongly than in the areas of science, technology, engineering and mathematics...

By Rob Lith 22 Aug 2018

Source: Jakub Jirsak ©
What's holding SA back from the public cloud?

The 2018 Right Scale State of the Cloud report indicates 81% of enterprises have a multi-cloud strategy and predicts 66% of cloud users intend on growing their cloud spend by 20%. But, what about the local market?

By Johan Scheepers 6 Aug 2018

How to protect your online privacy like you would your own home
How to protect your online privacy like you would your own home

Over the past few months, a spate of high-profile security breaches and scandals (most notably Facebook-Cambridge Analytica) have made the average person far more aware of how their data is used online...

By Alison Treadaway 24 Jul 2018

Liberty cyberattack underscores high threat level for SA businesses
Liberty cyberattack underscores high threat level for SA businesses

With breaking news of major South African insurer Liberty Holdings falling victim to a cyberattack, local companies have to heed the warning and pay more attention to their internal systems and processes...

By Colin Thornton 4 Jul 2018

Mobile crypto mining malware is a growing smartphone threat
Mobile crypto mining malware is a growing smartphone threat

According to a report by Kaspersky, the number of internet users affected by cryptocurrency mining software has jumped by a considerable margin this year, when compared to last...

By Andy Walker 29 Jun 2018

Youth might be at risk online with too much data sharing
Youth might be at risk online with too much data sharing

As Youth Month draws to a close, I am concerned about data and the security issues that pertain to it. Where do millennials stand in this era of unlimited data and heightened vulnerability?

By Manie van Schalkwyk 27 Jun 2018

Harnessing blockchain technology to transform global cybersecurity
Harnessing blockchain technology to transform global cybersecurity

In a digitally driven world, cybersecurity has become a highly lucrative sphere of modern business. Today, experts around the world are clawing for a piece of the estimated $8.5bn cyberthreat intelligence industry pie...

By Colin Thornton 17 May 2018

Emilar Gandhi, public policy manager for the SADC region for Facebook | Photo: Jessica Tennant
Facebook Africa, Digify Africa launch online safety programme for SA youth

Facebook Africa and Digify Africa have partnered to launch an online safety programme called Ilizwe Lam, Xhosa for my world...

By Jessica Tennant 25 Apr 2018

Next >