Latest showcases

More showcases...
Stay safe from cybercrime with what's left of 2019
Stay safe from cybercrime with what's left of 2019

Data breaches and cyberattacks are undeniably on the rise as hackers become increasingly sophisticated...

By Simon McCullough 30 Aug 2019

FaceApp and the dark side of AI
FaceApp and the dark side of AI

Terminator and The Matrix got it wrong. We all thought the villains of the AI era would be killer robots or hostile programmes...

By Lee Naik 14 Aug 2019

A new phase of cyber warfare has begun
A new phase of cyber warfare has begun

Hackers acting on behalf of nation-state powers are no longer just out to disrupt critical infrastructures - they're also actively seeking trade secrets...

By Simon McCullough 7 Aug 2019

Stay ahead of emerging cyber threats
Stay ahead of emerging cyber threats

Over the past couple of decades, changes in the threat landscape have driven changes in how we design, implement and manage security...

By Doros Hadjizenonos 8 Jul 2019

Essential cloud security concepts
Essential cloud security concepts

Possibly the most important attribute of the cloud is that critical business applications can be deployed, managed, and distributed faster and easier than by any other method...

By Doros Hadjizenonos 20 Jun 2019

AI in cybersecurity - friend or foe?
AI in cybersecurity - friend or foe?

It's no news that advances in AI and machine learning have enormous transformative potential for cybersecurity defences...

By Simon McCullough 13 Jun 2019

The world then and now, and how the way we protect our children needs to change
The world then and now, and how the way we protect our children needs to change

This National Child Protection Week (CPW), Google South Africa and Media Monitoring Africa hosted a roundtable putting a spotlight on the importance of online safety for children...

By Jessica Tennant 31 May 2019

365 days of GDPR: Has the storm passed?
365 days of GDPR: Has the storm passed?

There's no doubt that May 2018 will be remembered in business and technology circles as an important milestone in the evolution of data protection legislation...

By Johan Scheepers 29 May 2019

6 Tips for creating secure passwords
6 Tips for creating secure passwords

Passwords are like toothbrushes - you want to choose a good one, never share it, and replace it quarterly...

By Doros Hadjizenonos 13 May 2019

Fantastic (ethical) hackers and where to find them
Fantastic (ethical) hackers and where to find them

Data breaches and cyberattacks are unignorably on the rise and hackers are becoming increasingly sophisticated...

By Simon McCullough 26 Apr 2019

Q&A: Jaya Baloo talks quantum computing, cybersecurity in financial institutions
Q&A: Jaya Baloo talks quantum computing, cybersecurity in financial institutions

Jaya Baloo has been working internationally in information security for nearly two decades...

By Evan-Lee Courie 18 Apr 2019

How autonomous IT and security solutions will enable proactive IT departments
How autonomous IT and security solutions will enable proactive IT departments

The cybersecurity of a business is still largely reliant on the people within each company's IT department...

By Pieter Engelbrecht 11 Apr 2019

Why you need to be very, very aware of LoJax
Why you need to be very, very aware of LoJax

The conventional wisdom with malware is that you can kill it once and for all by wiping a system and starting from scratch, however...

By Bryan Hamman 5 Apr 2019

Overcoming the 2019 cyber threat
Overcoming the 2019 cyber threat

Over the last couple of years, the dramatic development of digital technologies has fuelled the growth and needs of the mobile workforce...

By Ronald Ravel 1 Apr 2019

The benefits of ML and User Entity Behaviour Analytics
The benefits of ML and User Entity Behaviour Analytics

The cost of cybercrime is rapidly outpacing our ability to keep up, but can machine learning add value to cybersecurity?

By Doros Hadjizenonos 28 Mar 2019

Creating a GDPR Compliance Framework with security tech
Creating a GDPR Compliance Framework with security tech

There has been a lot of talk of GDPR over the last year, so organisations today understand the serious repercussions of non-compliance...

By Pieter Engelbrecht 26 Mar 2019

2018 attacks highlighted the need for advanced threat intelligence
2018 attacks highlighted the need for advanced threat intelligence

In any situation where security or defence is the goal, lack of visibility into the techniques and tactics of your adversaries makes it nearly impossible to...

By Doros Hadjizenonos 26 Mar 2019

Using advanced AI to stay ahead of cyber criminals
Using advanced AI to stay ahead of cyber criminals

Staying ahead of today's accelerated cybercrime trends requires adding artificial intelligence (AI) to an organisation's network security strategy...

By Doros Hadjizenonos 22 Mar 2019

Cyber security professionals are no Darth Vader
Cyber security professionals are no Darth Vader

Cybercrime is undoubtedly a growing problem, and the costs involved are significant...

By Simeon Tassev 19 Mar 2019

Part 2: Will the so-called fourth industrial revolution propel SA forwards?
Part 2: Will the so-called fourth industrial revolution propel SA forwards?

Just what is the fourth industrial revolution? No really, what is it all about beyond the hype and jargon?

By Garth Williams 14 Mar 2019

Part 1: Will the so-called fourth industrial revolution propel SA forwards?
Part 1: Will the so-called fourth industrial revolution propel SA forwards?

Just what is the fourth industrial revolution? No really, what is it all about beyond the hype and jargon?

By Garth Williams 11 Mar 2019

Superbalist phishing scam sneakily asks for your credit card info
Superbalist phishing scam sneakily asks for your credit card info

Clothing retailer Superbalist on Monday alerted users that a new phishing scam is doing the rounds via SMS and email...

By Andy Walker 25 Feb 2019

There is more to cyber risk than security
There is more to cyber risk than security

Risk experts hold no doubts: the changes technology is bringing to businesses has far-reaching consequences. But the conversation is still split between two poles...

By Riaan Bekker 20 Feb 2019

The business of organised cybercrime
The business of organised cybercrime

Team leader, network administrator, data miner, money specialist. These are just some of the roles making a difference at today's enterprises...

By Simon McCullough 6 Feb 2019

Prepare for 2019: Weaponise Risk
Prepare for 2019: Weaponise Risk

When Noah weathered great floods, at least he had the luxury of waiting before sticking his head out of the hatch. But time is money, not only to earn some but to stay ahead...

By Riaan Bekker 6 Feb 2019

Using AI can make your business fraud-free and safer
Using AI can make your business fraud-free and safer

When it comes to AI, virtual assistants and chatbots are an immediate association for many. However, AI has other important uses for companies too - in fighting fraud...

By Rob Lith 4 Feb 2019

The security implications for 5G and IoT
The security implications for 5G and IoT

The advent of 5G networks is about much more than just incredibly fast speeds and more reliable connections...

By Doros Hadjizenonos 28 Jan 2019

How to create a cybersecurity culture
How to create a cybersecurity culture

'Cybersecurity' is still a relatively new word, making its first appearance to reference "protecting a computer or computer system" in 1989...

By Simeon Tassev 16 Jan 2019

#BizTrends2019: Digital, data-driven biometrics
#BizTrends2019: Digital, data-driven biometrics

The global biometrics market is growing rapidly. In fact, research indicates that the global market is growing a compounded growth rate of 22.9%...

By Pine Pienaar 15 Jan 2019

2019 predictions: The CIO will govern
2019 predictions: The CIO will govern

Silos - the word seemingly depicts a neat environment where things tick along or one where everything is operating in disparate chaos, the left hand clueless as to what the right hand is doing...

By Wynand Smit 14 Jan 2019

Next >