Cyber Security


The enemy within – insider ­security threats
May 2019, Wolfpack Information Risk, Editor's Choice, Financial (Industry)
Insider threats in today’s financial world are insidious and destructive and your defence against insiders should start long before the person assumes his/her position.

Read more...
The benefits of machine learning and UEBA
May 2019
Combining accurate and essential user behavioural data with machine learning allows you to more accurately monitor your users on an endpoint-by-endpoint basis.

Read more...
Protecting Microsoft cloud environments
May 2019, Integrated Solutions
Trend Micro Southern Africa announced the local launch of its Trend Micro Cloud App Security point of presence, designed to provide customers added security and protection of their Microsoft Office 365 environments.

Read more...
LoJax: Be very careful
May 2019
Even replacing drives won’t kill this malware, which is still active more than nine months after researchers from Arbor Networks detailed it.

Read more...
Securing the Industrial Internet of Things
May 2019, Axiz, IT infrastructure, Industrial (Industry)
The very benefits that makes the IIoT so compelling, makes it equally capable of damaging infrastructure operations and processes through bad actors.

Read more...
Vivotek strengthens cybersecurity
May 2019, CCTV, Surveillance & Remote Monitoring
Vivotek has announced the availability of comprehensive protection in its Cybersecurity Management Solution under the strategy of its 'Security within Security' campaign.

Read more...
Assessing impacts: The meteors of security and AI
May 2019
As security threats evolve and artificial intelligence pervades, what impact are they set to have on business over the next year?

Read more...
Scammers target job seekers
May 2019
Kaspersky Lab experts detected a blast of sophisticated spam emails in the first quarter of 2019, featuring fake job-offers that seemed to come from HR recruiters in large corporations.

Read more...
Insiders: who are they?
May 2019, Security Services & Risk Management
The 2018 Insider Threat Report by Cybersecurity Insiders reports that more than 51% of companies are concerned about unintentional insider attacks.

Read more...
Visibility is key, and lacking
May 2019, Editor's Choice
Cybercriminals are most likely to be caught on servers and networks, but detecting their time and point of entry remains a mystery.

Read more...
Hybrid cloud and hyper-converged data protection
May 2019, IT infrastructure
Arcserve Unified Data Protection extends disaster recovery and backup technologies to prevent downtime and data loss for hyper-converged and SaaS-based workloads.

Read more...
Cyber/physical perils in hospitality
April 2019, Wolfpack Information Risk, Editor's Choice, Entertainment and Hospitality (Industry)
How can we prepare for our holidays and avoid becoming the victim of a scam or data breach?

Read more...
New supply chain attack
April 2019, Kaspersky Lab
Kaspersky Lab has uncovered a new advanced persistent threat (APT) campaign that has affected a large number of users through what is known as a supply chain attack.

Read more...
When cybercrime affects health and safety
April 2019, Editor's Choice
The threat of a category-one cyber-attack is that everything could seem right – the readings on the meter could be fine, checklists would be followed, and equipment would work – yet danger could still unfold.

Read more...
Cloud and mobile deployments are the weakest links
April 2019, Check Point South Africa
Report highlights the cloud and mobile attack vectors used to target enterprises: nearly one in five organisations experienced a cloud security incident in the past year.

Read more...
Rethink security priorities
April 2019, News
Cryptocurrency mining is up 237%, phishing attacks increase by 269%, business email compromise attacks have gone up by 28%.

Read more...
New service to fight cybersecurity threats to African banks
April 2019
Foregenix is launching a service to combat the new and growing breed of cyber-attacks on African banks.

Read more...
Overcoming the 2019 cyberthreat
April 2019, IT infrastructure
The flexibility of remote working is good, however, the wider a network perimeter has to stretch, the more scope exists for security breaches.

Read more...
How to spot if your password was stolen in a security breach
March 2019
This article will tell you how to find out if your email address or password has been stolen and to check if passwords you are choosing are secure or not.

Read more...
IoT is convergence in action
March 2019, Gijima Electronic and Security Systems (GESS), NEC XON, Technews Publishing, Axiz, G4S South Africa, Editor's Choice, Integrated Solutions, IT infrastructure
The Internet of Things gains more than enough attention these days, but the IoT demonstrates the reality of the convergence between the physical and cyber worlds, and physical security is part of it.

Read more...



      Page 1 of 42   Next >   Last >>