Latest showcases

More showcases...

SOUTH AFRICA

Stay ahead of emerging cyber threats
Stay ahead of emerging cyber threats

Over the past couple of decades, changes in the threat landscape have driven changes in how we design, implement and manage security...

By Doros Hadjizenonos 8 Jul 2019

SOUTH AFRICA

AI in cybersecurity - friend or foe?
AI in cybersecurity - friend or foe?

It's no news that advances in AI and machine learning have enormous transformative potential for cybersecurity defences...

By Simon McCullough 13 Jun 2019

UNITED STATES

Boris Dzhingarov
How to overcome internet threats with the help of VPNOverview

Are you afraid someone might be snooping through your online data? You should be - especially when you're on public Wi-Fi. Luckily there are steps you can take to protect yourself when using the internet...

By Boris Dzhingarov, Issued by Monetary Library 7 Jun 2019

SOUTH AFRICA

365 days of GDPR: Has the storm passed?
365 days of GDPR: Has the storm passed?

There's no doubt that May 2018 will be remembered in business and technology circles as an important milestone in the evolution of data protection legislation...

By Johan Scheepers 29 May 2019

SOUTH AFRICA

6 Tips for creating secure passwords
6 Tips for creating secure passwords

Passwords are like toothbrushes - you want to choose a good one, never share it, and replace it quarterly...

By Doros Hadjizenonos 13 May 2019

GLOBAL

Fantastic (ethical) hackers and where to find them
Fantastic (ethical) hackers and where to find them

Data breaches and cyberattacks are unignorably on the rise and hackers are becoming increasingly sophisticated...

By Simon McCullough 26 Apr 2019

SOUTH AFRICA

Q&A: Jaya Baloo talks quantum computing, cybersecurity in financial institutions
Q&A: Jaya Baloo talks quantum computing, cybersecurity in financial institutions

Jaya Baloo has been working internationally in information security for nearly two decades...

By Evan-Lee Courie 18 Apr 2019

SOUTH AFRICA

How autonomous IT and security solutions will enable proactive IT departments
How autonomous IT and security solutions will enable proactive IT departments

The cybersecurity of a business is still largely reliant on the people within each company's IT department...

By Pieter Engelbrecht 11 Apr 2019

SOUTH AFRICA

Why you need to be very, very aware of LoJax
Why you need to be very, very aware of LoJax

The conventional wisdom with malware is that you can kill it once and for all by wiping a system and starting from scratch, however...

By Bryan Hamman 5 Apr 2019

SOUTH AFRICA

Overcoming the 2019 cyber threat
Overcoming the 2019 cyber threat

Over the last couple of years, the dramatic development of digital technologies has fuelled the growth and needs of the mobile workforce...

By Ronald Ravel 1 Apr 2019

SOUTH AFRICA

2018 attacks highlighted the need for advanced threat intelligence
2018 attacks highlighted the need for advanced threat intelligence

In any situation where security or defence is the goal, lack of visibility into the techniques and tactics of your adversaries makes it nearly impossible to...

By Doros Hadjizenonos 26 Mar 2019

SOUTH AFRICA

Using advanced AI to stay ahead of cyber criminals
Using advanced AI to stay ahead of cyber criminals

Staying ahead of today's accelerated cybercrime trends requires adding artificial intelligence (AI) to an organisation's network security strategy...

By Doros Hadjizenonos 22 Mar 2019

SOUTH AFRICA

Cyber security professionals are no Darth Vader
Cyber security professionals are no Darth Vader

Cybercrime is undoubtedly a growing problem, and the costs involved are significant...

By Simeon Tassev 19 Mar 2019

SOUTH AFRICA

There is more to cyber risk than security
There is more to cyber risk than security

Risk experts hold no doubts: the changes technology is bringing to businesses has far-reaching consequences. But the conversation is still split between two poles...

By Riaan Bekker 20 Feb 2019

SOUTH AFRICA

The business of organised cybercrime
The business of organised cybercrime

Team leader, network administrator, data miner, money specialist. These are just some of the roles making a difference at today's enterprises...

By Simon McCullough 6 Feb 2019

SOUTH AFRICA

Prepare for 2019: Weaponise Risk
Prepare for 2019: Weaponise Risk

When Noah weathered great floods, at least he had the luxury of waiting before sticking his head out of the hatch. But time is money, not only to earn some but to stay ahead...

By Riaan Bekker 6 Feb 2019

SOUTH AFRICA

Using AI can make your business fraud-free and safer
Using AI can make your business fraud-free and safer

When it comes to AI, virtual assistants and chatbots are an immediate association for many. However, AI has other important uses for companies too - in fighting fraud...

By Rob Lith 4 Feb 2019

SOUTH AFRICA

The security implications for 5G and IoT
The security implications for 5G and IoT

The advent of 5G networks is about much more than just incredibly fast speeds and more reliable connections...

By Doros Hadjizenonos 28 Jan 2019

SOUTH AFRICA

How to create a cybersecurity culture
How to create a cybersecurity culture

'Cybersecurity' is still a relatively new word, making its first appearance to reference "protecting a computer or computer system" in 1989...

By Simeon Tassev 16 Jan 2019

SOUTH AFRICA

Risk, security teams must collaborate
Risk, security teams must collaborate

Businesses across the board are facing an unprecedented range of cyber risks that could have catastrophic consequences...

By Jayson O’Reilly 28 Dec 2018

SOUTH AFRICA

Are we making ourselves more vulnerable to cyber attacks in the workplace?
Are we making ourselves more vulnerable to cyber attacks in the workplace?

Some organisations still feel that by digitising their businesses, they will be exposing themselves to cyber threats...

By Brendan McAravey 14 Dec 2018

SOUTH AFRICA

The burning platform for data security and compliance
The burning platform for data security and compliance

"We have connected all of our lives - personal, professional and national - to the internet. That's where the bad guys will go because that's where our lives are, our money, our secrets"...

By Gavin Meyer 5 Dec 2018

SOUTH AFRICA

Adding threat intelligence to the security mix
Adding threat intelligence to the security mix

Today's threat landscape is so complex and fast-paced, it is impossible to prevent every threat or attack...

By Simon Campbell-Young 26 Nov 2018

SOUTH AFRICA

Privacy vs Profit: Will 2019 be the year of consumer paranoia?
Privacy vs Profit: Will 2019 be the year of consumer paranoia?

On the surface of our tech-dependent lives, all appears to be wonderfully beneficial and benign...

By Colin Thornton 26 Nov 2018

SOUTH AFRICA

Why privacy and security matter
Why privacy and security matter

The 2018 Data Threat Report from Thales and 451 Research found that only 13% of organisations will not be impacted by privacy regulations...

By Jayson O’Reilly 23 Nov 2018

SOUTH AFRICA

#BlackFriday: Safe shopping starts with awareness
#BlackFriday: Safe shopping starts with awareness

One of the most common pieces of advice we get about avoiding phishing scams is that, if it seems too good to be true, it probably is...

By Brian Pinnock 22 Nov 2018

SOUTH AFRICA

The specialised security concerns of OT networks
The specialised security concerns of OT networks

As with traditional IT networks, Operational Technology (OT) networks are undergoing a digital transformation process of their own...

By Doros Hadjizenonos 13 Nov 2018

SOUTH AFRICA

British Airways highlights need for GDPR compliance
British Airways highlights need for GDPR compliance

Earlier this year, Liberty Life became one of the first global firms to suffer a major breach under General Data Protection Regulation (GDPR)...

By Gary Allemann 7 Nov 2018

SOUTH AFRICA

Digital forensics is crucial to the security chain
Digital forensics is crucial to the security chain

The past decade has seen developments in technology that were previously unimagined. However, they have also become tools for cybercriminals...

By Simon Campbell-Young 6 Nov 2018

SOUTH AFRICA

How CISOs can maintain corporate privacy
How CISOs can maintain corporate privacy

Today's workforce is increasingly comprised of millennials and other tech-savvy individuals that are accustomed to using technology in every aspect of their lives. As new technology emerges...

By Doros Hadjizenonos 6 Nov 2018

Next >