Information Security



XM Cyber counters attacks involving Microsoft Active Directory exploits
Issue 3 2022
XM Cyber unveils first solution to reveal entire attack paths across AD and other vectors, aiding remediation and continuously protecting critical assets.

Read more...
How to stop the costliest internet scam
Issue 3 2022
While ransomware, hacking, API hacks, and all the other cybersecurity threats make headlines, it is worth remembering that the costliest internet scam is still business email compromises.

Read more...
How the MITRE ATT&CK Framework has revolutionised cybersecurity
Issue 3 2022
The MITRE ATT&CK framework is the most widely adopted and used by industry experts; what’s more, it is free and provides businesses with a fantastic source of information to strengthen their security posture.

Read more...
Trying to catch the big phish
Issue 3 2022
Rather than focus on techniques, John Mc Loughlin, CEO of J2 discusses how phishing applications have changed to match new security standards.

Read more...
Corporations protected, but not secure
Issue 3 2022, News & Events, Security Services & Risk Management
Nearly three quarters of South Africa’s top 100 corporates are investing more in cybersecurity than the industry average, but an almost equal proportion don’t feel fully protected by their current cybersecurity strategy.

Read more...
People and processes for banking security
Issue 3 2022, Guardian Eye, Security Services & Risk Management
South Africa is the third most-targeted country worldwide when it comes to cybercrime and it is no different with the local banking sector, which needs to ensure its systems and people are ready.

Read more...
Dashboard for streamlined ransomware recovery
Issue 2 2022
The new CyberSense interface provides intuitive post-attack forensic reports that provide powerful insight into data corruption due to a ransomware attack, facilitating ransomware recovery.

Read more...
You have a ‘super malicious insider’
Issue 2 2022
There’s a super malicious insider who is technically proficient and often acutely aware of an organisation’s technical limitations in proactively detecting insider threats.

Read more...
Secret monthly fee
Issue 2 2022, Kaspersky
Kaspersky researchers have observed fraudsters actively spreading Trojans, which secretly subscribe users to paid services, disguised as various mobile apps, including popular games, healthcare apps and photo editors.

Read more...
Keep cloud-based security simple
Issue 2 2022
SA businesses have more mobile workforces now, which means a greater need for cloud security that follows data and users wherever they are amidst increase in cyberattacks.

Read more...
How crypto cons work and how to protect yourself
Issue 2 2022
The digital gold rush is here. As more people attempt to make money from cryptocurrencies, criminals and con artists aren’t far behind, says Carey van Vlaanderen, CEO of ESET South Africa.

Read more...
Ongoing cybersecurity with a click
Issue 2 2022, Technews Publishing, Editor's Choice, Security Services & Risk Management
Maintain your cybersecurity posture with web services from Pretect designed to keep your IT infrastructure optimally protected 24 x 7.

Read more...
The battle of AI and ML in the cybersecurity world
Issue 2 2022, Products & Solutions
The security industry is using ML/AI in various applications such as tackling huge volumes of malware, detecting spam and business email compromises, analysing network traffic, using facial recognition and more.

Read more...
Cyber questions for today’s business
Issue 2 2022
Roberto Arico, Cybereason senior sales engineer for Africa, answers cybersecurity questions companies need to consider in the present risk landscape.

Read more...
Exclusive Networks Africa expands security services
Issue 1 2022, News & Events, Products & Solutions
Exclusive Networks Africa announced a new partnership agreement with Infoblox to simplify complex distributed networking and security, by delivering modern, cloud-first networking and security services that automate and streamline user experiences.

Read more...
How cloud computing affects businesses in RSA
Issue 1 2022
In order to optimise the benefits of data security in enterprises, cloud computing solutions must be considered as part of a comprehensive security strategy.

Read more...
Zero time. Zero tolerance. Zero-day.
Issue 1 2022
Tackling the complexity and security of zero-day attacks in 2022, by Stephen Osler, co-founder and business development director at Nclose.

Read more...
Be careful of taking a bite out of that web cookie
Issue 2 2022
With almost every site today still asking whether the user wants to ‘accept all cookies’, Kaspersky highlights that there are certain cybersecurity considerations to keep in mind.

Read more...
Securing your estate’s technology
Residential Security Handbook 2022: SMART Estate Living , Technews Publishing, Editor's Choice, Residential Estate (Industry)
Estates need to be as cybersecure as any other organisation and starting with the human risk is one of the easiest and most effective mitigation strategies – but not the only one.

Read more...
Achieve video cybersecurity and peace of mind
Issue 1 2022, Milestone Systems
Focus on business as usual, safeguard against malicious activity as cybercrime is on the rise and costing organisations an estimated $2,9 million every minute.

Read more...



<< First   < Previous   Page 18 of 85   Next >   Last >>








While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.