Cyber Security


More is less in cybersecurity
Issue 2 2021
Post-pandemic paradox: more solutions do not bring better protection. Despite 80% of organisations running up to 10 different protection and cybersecurity solutions simultaneously, more than 50% of them experienced downtime from data loss last year.

Read more...
Ransomware and Microsoft Exchange Server attacks are surging
Issue 2 2021
Check Point Research sees global surges in ransomware attacks, alongside increases in cyberattacks targeting Microsoft Exchange Server vulnerabilities at a time where CISA has raised the alarm about ransomware attacks against Microsoft Exchange servers.

Read more...
Malware disguised as meeting apps spiked by 1067%
Issue 2 2021
Atlas VPN analysis reveals that cyber threats disguised as videoconferencing applications jumped by 1067% in a year. The data analysed was provided by Kaspersky.

Read more...
The realities of AI in cybersecurity: catastrophic forgetting
Issue 2 2021
There is a lot of hype about the use of artificial intelligence (AI) in cybersecurity. The truth is that the role and potential of AI in security is still evolving and often requires experimentation and evaluation.

Read more...
Cyber makes it secure
Issue 2 2021
Stas Protassov, Acronis co-founder and technology president comments on the recent hacking of over 150 000 Verkada surveillance cameras.

Read more...
Security patches are not a plan
Issue 2 2021, Galix Group
Patches are undoubtedly an essential component of a cybersecurity strategy, but with the current digital landscape, with many employees continuing to work from home, patches alone are not sufficient.

Read more...
Free technology to boost future careers
Issue 2 2021, Security Services & Risk Management
A global shortage of cybersecurity professionals has become so severe that companies are increasingly at risk from hacking and industrial espionage.

Read more...
IoT malware attacks worldwide surge by 66%
Issue 2 2021, News
Based on the ‘Global Cyberattack Trends’ report by SonicWall, in 2020, malware attacks on IoT devices spiked by 66% compared to 2019. In a year, they grew from 34,3 million cases to nearly 56,9 million.

Read more...
New security frontiers: An opportunity to rewrite the rules
Issue 2 2021
Paul Crichard, chief security technology strategist, BT, explores how organisations can reimagine their security for the cloud, turning it into an enabler for better ways of operating.

Read more...
Seven simple steps to keep your SME cyber-safe
Issue 2 2021
Cybersecurity experts at ENHALO, a full-circle cyber defence group, understand the cyber-challenges facing the SME owner; here are seven simple steps to keep your SME cyber-safe in 2021.

Read more...
Snyk launches in South Africa
Issue 2 2021, News
Snyk provides a platform to secure all of the critical components of today’s cloud native application development, including the code, open source libraries, container infrastructure and infrastructure as code.

Read more...
Acronis acquires Synapsys in South Africa
Issue 2 2021, News
Acronis has acquired Synapsys, its long-time partner located in Cape Town, South Africa, that specialises in distributing Acronis Cyber Protection Solutions through the service provider channel.

Read more...
Gallagher achieves UK cybersecurity standard
Issue 1 2021, Gallagher, Access Control & Identity Management, Government and Parastatal (Industry)
The Gallagher UK CPNI CAPSS High Security System features compliances to the Cyber Assurance for Physical Security Systems (CAPSS) standard, and the Centre for the Protection of National Infrastructure (CPNI) Readers and Tokens standards.

Read more...
New Thales distributors for Africa
Issue 1 2021, Cyber Security South Africa, News
Cyber Security Africa Distribution (CSAD) and Cyber Security South Africa (CSSA) have been appointed as distributors of Thales access management and data protection solutions across the African continent.

Read more...
Three key areas for zero-trust access
Issue 1 2021, Cyber Security South Africa, Editor's Choice, Access Control & Identity Management
Protecting the network with this zero-trust access (ZTA) approach means that all users, all devices and all web applications from the cloud must be trusted, authenticated, and have the correct amount of access privilege (and no more).

Read more...
Always-connected 5G PC cybersecurity
Issue 1 2021
Sophos has announced its plans to provide Sophos Intercept X endpoint protection for 5G PCs powered by Qualcomm Snapdragon compute platforms, providing users with next-generation security through an always-on, always-connected PC environment.

Read more...
Malware: the biggest threat
Issue 1 2021, J2 Software
A research study conducted by Deep Instinct reports on the hundreds of millions of attempted cyber-attacks that occurred every day throughout 2020 showing malware increased by 358% overall.

Read more...
Securing access to the data centre
Issue 1 2021, Suprema
When looking for a solution to securing your data centre, FaceStation F2 stands out in terms of its versatility, security and rich feature offering.

Read more...
Secure alternative to passwords
Issue 1 2021, Suprema
Fingerprint biometrics offer a secure alternative to regular passwords; they cannot be lost/forgotten and cannot be shared.

Read more...
Information visibility is key for brand protection
Issue 1 2021
High-value employees now give away more information in the social media age than ever before and businesses need a solution that will immediately block, hide or remove racial slurs, sensitive data like credit card numbers, competitor posts, scams, malicious links and more.

Read more...



      Page 1 of 55   Next >   Last >>