Latest showcases

More showcases...
There is more to cyber risk than security
There is more to cyber risk than security

Risk experts hold no doubts: the changes technology is bringing to businesses has far-reaching consequences. But the conversation is still split between two poles...

By Riaan Bekker 2 days ago

The business of organised cybercrime
The business of organised cybercrime

Team leader, network administrator, data miner, money specialist. These are just some of the roles making a difference at today's enterprises...

By Simon McCullough 6 Feb 2019

Prepare for 2019: Weaponise Risk
Prepare for 2019: Weaponise Risk

When Noah weathered great floods, at least he had the luxury of waiting before sticking his head out of the hatch. But time is money, not only to earn some but to stay ahead...

By Riaan Bekker 6 Feb 2019

Using AI can make your business fraud-free and safer
Using AI can make your business fraud-free and safer

When it comes to AI, virtual assistants and chatbots are an immediate association for many. However, AI has other important uses for companies too - in fighting fraud...

By Rob Lith 4 Feb 2019

The security implications for 5G and IoT
The security implications for 5G and IoT

The advent of 5G networks is about much more than just incredibly fast speeds and more reliable connections...

By Doros Hadjizenonos 28 Jan 2019

How to create a cybersecurity culture
How to create a cybersecurity culture

'Cybersecurity' is still a relatively new word, making its first appearance to reference "protecting a computer or computer system" in 1989...

By Simeon Tassev 16 Jan 2019

#BizTrends2019: Digital, data-driven biometrics
#BizTrends2019: Digital, data-driven biometrics

The global biometrics market is growing rapidly. In fact, research indicates that the global market is growing a compounded growth rate of 22.9%...

By Pine Pienaar 15 Jan 2019

2019 predictions: The CIO will govern
2019 predictions: The CIO will govern

Silos - the word seemingly depicts a neat environment where things tick along or one where everything is operating in disparate chaos, the left hand clueless as to what the right hand is doing...

By Wynand Smit 14 Jan 2019

#BizTrends2019: The rise of IT acronyms
#BizTrends2019: The rise of IT acronyms

Acronyms have always dominated in the tech industry, but those that are set to rule the world in 2019 are the ones to remember...

By Rowan Fine 9 Jan 2019

#BizTrends2019: 4 Tech trends to watch for in 2019
#BizTrends2019: 4 Tech trends to watch for in 2019

It's that time of year again when everyone in the tech industry takes out their crystal balls and starts making predictions about what's going to happen in the industry in 2019...

By Esti Kilian 7 Jan 2019

#BizTrends2019: SA businesses moving closer to data-driven decision making
#BizTrends2019: SA businesses moving closer to data-driven decision making

In recent years, established South African businesses have become more aware of the importance of data and its potential role in high-level strategy...

By Brian Timperley 7 Jan 2019

Risk, security teams must collaborate
Risk, security teams must collaborate

Businesses across the board are facing an unprecedented range of cyber risks that could have catastrophic consequences...

By Jayson O’Reilly 28 Dec 2018

Are we making ourselves more vulnerable to cyber attacks in the workplace?
Are we making ourselves more vulnerable to cyber attacks in the workplace?

Some organisations still feel that by digitising their businesses, they will be exposing themselves to cyber threats...

By Brendan McAravey 14 Dec 2018

6 tips to prevent online fraud from sinking your business
6 tips to prevent online fraud from sinking your business

The success of the recent Black Friday and Cyber Monday weekend is testament to the opportunity offered by digital commerce. But local entrepreneurs should not underestimate the threat of online fraud...

By Brendon Williamson 12 Dec 2018

The burning platform for data security and compliance
The burning platform for data security and compliance

"We have connected all of our lives - personal, professional and national - to the internet. That's where the bad guys will go because that's where our lives are, our money, our secrets"...

By Gavin Meyer 5 Dec 2018

Adding threat intelligence to the security mix
Adding threat intelligence to the security mix

Today's threat landscape is so complex and fast-paced, it is impossible to prevent every threat or attack...

By Simon Campbell-Young 26 Nov 2018

Privacy vs Profit: Will 2019 be the year of consumer paranoia?
Privacy vs Profit: Will 2019 be the year of consumer paranoia?

On the surface of our tech-dependent lives, all appears to be wonderfully beneficial and benign...

By Colin Thornton 26 Nov 2018

Why privacy and security matter
Why privacy and security matter

The 2018 Data Threat Report from Thales and 451 Research found that only 13% of organisations will not be impacted by privacy regulations...

By Jayson O’Reilly 23 Nov 2018

#BlackFriday: Safe shopping starts with awareness
#BlackFriday: Safe shopping starts with awareness

One of the most common pieces of advice we get about avoiding phishing scams is that, if it seems too good to be true, it probably is...

By Brian Pinnock 22 Nov 2018

The specialised security concerns of OT networks
The specialised security concerns of OT networks

As with traditional IT networks, Operational Technology (OT) networks are undergoing a digital transformation process of their own...

By Doros Hadjizenonos 13 Nov 2018

British Airways highlights need for GDPR compliance
British Airways highlights need for GDPR compliance

Earlier this year, Liberty Life became one of the first global firms to suffer a major breach under General Data Protection Regulation (GDPR)...

By Gary Allemann 7 Nov 2018

Digital forensics is crucial to the security chain
Digital forensics is crucial to the security chain

The past decade has seen developments in technology that were previously unimagined. However, they have also become tools for cybercriminals...

By Simon Campbell-Young 6 Nov 2018

How CISOs can maintain corporate privacy
How CISOs can maintain corporate privacy

Today's workforce is increasingly comprised of millennials and other tech-savvy individuals that are accustomed to using technology in every aspect of their lives. As new technology emerges...

By Doros Hadjizenonos 6 Nov 2018

Why are CIOs and CISOs positions becoming more challenging?
Why are CIOs and CISOs positions becoming more challenging?

CIOs and CISO's across industries are regularly moving between positions and companies because of a common mistake...

By Pieter Engelbrecht 31 Oct 2018

App permissions can be used to exploit your data
App permissions can be used to exploit your data

Every time an application is installed on a device, the user is asked to allow that app certain permissions...

By Simon Campbell-Young 26 Oct 2018

Doros Hadjizenonos is Regional Sales Director Southern Africa at Fortinet
Recognising and preventing modern cyber scams

When it comes to protecting yourself and your organisation against cyber scams, there's no "one-size-fits-all" solution...

By Doros Hadjizenonos 22 Oct 2018

Closing the skills gap with cybersecurity training
Closing the skills gap with cybersecurity training

To close the skills gap, organisations and academic institutions must take proactive measures...

By Doros Hadjizenonos 12 Oct 2018

Non-compliance: leading organisations down the rabbit hole
Non-compliance: leading organisations down the rabbit hole

PwC's latest Global Economic Crime and Fraud Survey 2018 ranks South Africa as the second most targeted country in the world when it comes to cyber attacks...

By Simeon Tassev 10 Oct 2018

Basic cyber hygiene practices that go a long way
Basic cyber hygiene practices that go a long way

As mobile computing - especially using personal devices - becomes more common, the potential for network compromise is increasing...

By Doros Hadjizenonos 9 Oct 2018

Building credibility in a fast-moving ICT sector
Building credibility in a fast-moving ICT sector

In today's ICT business landscape, credibility is hard to achieve and even harder to maintain in the long run...

By Steve Briggs 5 Oct 2018

Next >