There is more to cyber risk than security
There is more to cyber risk than security

Risk experts hold no doubts: the changes technology is bringing to businesses has far-reaching consequences. But the conversation is still split between two poles...

By Riaan Bekker 5 hours ago

Business must do more to limit exposure of data in the cloud
Business must do more to limit exposure of data in the cloud

Organisations should pay closer attention to security concerns associated with storing data in the cloud...

1 day ago

Cryptominers hit 10x more organisations than ransomware in 2018
Cryptominers hit 10x more organisations than ransomware in 2018

Check Point Software Technologies has published the second instalment of its 2019 Security Report...

2 days ago

Cyber security is key to smart metering deployment
Cyber security is key to smart metering deployment

As adoption of advanced metering infrastructure (AMI) becomes more widespread, its appeal to cyber attackers will undoubtedly increase...

By Darren Oxlee 15 Feb 2019

How not to get hacked
How not to get hacked

Gone are the days when we could live in peace believing that as low-profile individuals, we were unlikely to draw the attention of hackers...

14 Feb 2019

The missing link for integrating physical and IT security resources
The missing link for integrating physical and IT security resources

Better communication is the key to integrating physical and IT security in enterprises today...

14 Feb 2019

Is your organisation ready to comply with PoPI Act?
Is your organisation ready to comply with PoPI Act?

According to a Sophos commissioned survey, only 34% of South African organisations are ready to comply with PoPI Act...

14 Feb 2019

Vishal Barapatre is chief technology officer at In2IT Technologies
The link between compliance and cybersecurity

Cyber attacks are gaining momentum, and each new publicised incident highlights the increasing need for effective data protection...

By Vishal Barapatre 13 Feb 2019

Report reveals 37% of organisations impacted by cryptomining
Report reveals 37% of organisations impacted by cryptomining

A new report shows 20% of companies globally continue to be hit by cryptomining attacks every week; 33% hit by mobile malware, and 4% by ransomware...

11 Feb 2019

To keep strategic customers, good governance is key
To keep strategic customers, good governance is key

The principles of good governance are elementary to the success and long-term sustainability of all businesses...

11 Feb 2019

SA is at high risk for harmful online behaviour
SA is at high risk for harmful online behaviour

South Africans are among the most at risk for exposure to negative behaviour online according to Microsoft's 2019 Digital Civility Index...

8 Feb 2019

A quick guide to end-to-end business security
A quick guide to end-to-end business security

The threat of cyber attacks has been at the forefront of discussions in the media and in the technology industry itself...

By Elaine Wang 6 Feb 2019

The business of organised cybercrime
The business of organised cybercrime

Team leader, network administrator, data miner, money specialist. These are just some of the roles making a difference at today's enterprises...

By Simon McCullough 6 Feb 2019

Prepare for 2019: Weaponise Risk
Prepare for 2019: Weaponise Risk

When Noah weathered great floods, at least he had the luxury of waiting before sticking his head out of the hatch. But time is money, not only to earn some but to stay ahead...

By Riaan Bekker 6 Feb 2019

SA is a target for cyber attacks
SA is a target for cyber attacks

The digitisation of our personal and work lives is making society increasingly reliant on technology, and more vulnerable to the risk of a debilitating cyberattack...

5 Feb 2019

What will shape data privacy in the future?
What will shape data privacy in the future?

2018 was a landmark year for regulators and businesses alike following the introduction of GDPR. There was a move from businesses to step up when it came to protecting personal data...

By Nigel Tozer 5 Feb 2019

Using AI can make your business fraud-free and safer
Using AI can make your business fraud-free and safer

When it comes to AI, virtual assistants and chatbots are an immediate association for many. However, AI has other important uses for companies too - in fighting fraud...

By Rob Lith 4 Feb 2019

Be vigilant as phishing season ramps up
Be vigilant as phishing season ramps up

F5 Labs, in collaboration with Webroot, has launched its second annual Phishing and Fraud report, highlighting an anticipated threat surge from October until January...

4 Feb 2019

Become more cyber smart in 2019
Become more cyber smart in 2019

As we enter 2019, why not also add 'improving cyber skills' to your list of goals?

29 Jan 2019

Inaugural Africa Tech Week set for March 2019
Inaugural Africa Tech Week set for March 2019

The inaugural Africa Tech Week, taking place in Cape Town from 4-5 March 2019 is set to become the largest annual tech conference in Africa...

29 Jan 2019

#DataPrivacyDay: 6 online privacy tips for everyone
#DataPrivacyDay: 6 online privacy tips for everyone

28 January was Data Privacy Day and here are simple online privacy rules that everyone should follow to stay safe and secure...

28 Jan 2019

Are we safe and secure?
Are we safe and secure?

We can't deny it, the world has become much safer ever since safety and security became a selling point...

By Johann van Rooyen 28 Jan 2019

The security implications for 5G and IoT
The security implications for 5G and IoT

The advent of 5G networks is about much more than just incredibly fast speeds and more reliable connections...

By Doros Hadjizenonos 28 Jan 2019

The 2019 CISO Africa Conference welcomes Netskope as Lead Partner
The 2019 CISO Africa Conference welcomes Netskope as Lead Partner

Featuring more than 40 stellar IT security speakers and more than 120 top-notch senior-level attendees, the CISO Africa 2019 Conference breaks down IT security leadership strategies and methodologies African businesses...

Issued by Corinium Global Intelligence 25 Jan 2019

Report highlights rapid changes in DDoS threat landscape
Report highlights rapid changes in DDoS threat landscape

Findings of a new report from Netscout have highlighted some key points around Distributed Denial of Service (DDoS) activity worldwide during 2018...

24 Jan 2019

Check Point reveal vulnerabilities in online game
Check Point reveal vulnerabilities in online game

Check Point Software Technologies have shared details of vulnerabilities that could have affected any player of the online battle game, Fortnite...

21 Jan 2019

What 2018 taught businesses about data protection
What 2018 taught businesses about data protection

Around this time last year, commentators across the industry predicted that 2018 was going to be the 'year of data protection', and it was...

By Dan Shprung 21 Jan 2019

Leading pharmaceutical CISO heads to Johannesburg for CISO Africa 2019
Leading pharmaceutical CISO heads to Johannesburg for CISO Africa 2019

A stellar group of local and international speakers are lined up for the CISO Africa 2019 conference, which kicks off in Johannesburg in February...

Issued by Corinium Global Intelligence 17 Jan 2019

NordVPN's 5 cybersecurity predictions for 2019
NordVPN's 5 cybersecurity predictions for 2019

Cybersecurity threats will keep getting worse in 2019...

17 Jan 2019

How to create a cybersecurity culture
How to create a cybersecurity culture

'Cybersecurity' is still a relatively new word, making its first appearance to reference "protecting a computer or computer system" in 1989...

By Simeon Tassev 16 Jan 2019

Show more