Cyber Security



The 5 most common security concerns in the Web 3.0 world
Issue 3 2022
Cisco Talos has done a deep dive to highlight the most common security challenges, driven by cryptocurrency, blockchain technology, decentralised applications and decentralised file storage.

Read more...
The components of and need for cyber resilience
Issue 3 2022, Security Services & Risk Management
Organisations need to implement a comprehensive cyber resilience solution with data protection, backup, disaster recovery and business continuity to protect against ever-more complex and rising cyberthreats.

Read more...
Preventing cyberattacks on critical infrastructure
Issue 3 2022, Industrial (Industry)
Cyberattacks have the potential to disrupt our lives completely, and in instances where critical national infrastructure is attacked, they could disrupt the country’s entire economy, leading to loss of life and livelihoods.

Read more...
Unrecoverable encrypted data
Issue 3 2022, News
Cybersecurity research indicates that 76% of organisations admit to paying ransomware criminals, however, one-third are still unable to recover data.

Read more...
Citrix App Protection helps secure remote workers
Issue 3 2022, IT infrastructure
Many organisations are implementing a zero-trust security model with data protection as a top priority. This is largely due to the increase in remote work and unmanaged personal devices playing a growing role in the enterprise.

Read more...
2022 Cloud Security Report
Issue 3 2022, IT infrastructure
The 2022 Cloud Security Report reveals how security executives and practitioners are using the cloud, how their organisations are responding to security threats in the cloud, and the challenges they are facing.

Read more...
Arcserve launches N Series appliances
Issue 3 2022, IT infrastructure
Arcserve introduces N Series appliances offering enterprise-level integrated data protection, recovery and cybersecurity to allow customers to simplify their IT environments and secure data.

Read more...
Securing business information more important than ever
Issue 3 2022, Products
SMBs need to operate safely within the physical and virtual boundaries created by work-from-home business practices, as well as in-office operations.

Read more...
Storage is essential for a comprehensive cybersecurity strategy
Issue 3 2022, Integrated Solutions
Cyber resilience is the ability of an enterprise to limit the impact of security incidents by deploying and arranging appropriate security tools and processes.

Read more...
Malicious file protection for mobile devices
Issue 3 2022
The new version of Check Point Harmony Mobile, a mobile threat solution, can now block the download of malicious files to mobile devices, preventing file-based cyberattacks on organisations.

Read more...
Turnkey data loss prevention solution
Issue 3 2022, IT infrastructure, Products
Acronis’s expertise in data protection and the managed service provider market yields an innovative, fast-track approach for the prevention of catastrophic data leaks.

Read more...
The cybersecurity consolidation conundrum
Issue 3 2022, Editor's Choice, Healthcare (Industry)
Check Point discusses why less is sometimes more when it comes to securing your organisation from the innumerable cyberattacks happening every day.

Read more...
Companies continue to pay multiple ransom demands
Issue 3 2022, News
Study reveals that 80% of companies that paid a ransom demand were hit again, nearly 50% reported paying a second ransom and nearly 10% paid a third time.

Read more...
DCC becomes sole Symantec distributor for South Africa
Issue 3 2022, News
Drive Control Corporation (DCC) has been appointed the sole distributor for Symantec security solutions to the South Africa channel, and will now also be distributing Symantec into the SADC region.

Read more...
The evolution of vulnerability management
Issue 3 2022
As organisations focus on digitally transforming their enterprises, cybersecurity professionals have been facing an expansion of their attack surface – compounded by the digital explosion during the pandemic.

Read more...
VMware enhances its lateral security for multi-cloud
Issue 3 2022, Technews Publishing
Ahead of RSA Conference 2022, VMware introduced Contexa, VMware’s full-fidelity threat intelligence capability that observes the breadth of VMware’s network, endpoint, and user technologies.

Read more...
Securing mobile devices for a remote workforce
Issue 3 2022
As a channel to your personal data, banking and accounts, and a link to your work and business data, smartphones drive cybercriminals directly to your pocket.

Read more...
XM Cyber counters attacks involving Microsoft Active Directory exploits
Issue 3 2022
XM Cyber unveils first solution to reveal entire attack paths across AD and other vectors, aiding remediation and continuously protecting critical assets.

Read more...
How to stop the costliest internet scam
Issue 3 2022
While ransomware, hacking, API hacks, and all the other cybersecurity threats make headlines, it is worth remembering that the costliest internet scam is still business email compromises.

Read more...
How the MITRE ATT&CK Framework has revolutionised cybersecurity
Issue 3 2022
The MITRE ATT&CK framework is the most widely adopted and used by industry experts; what’s more, it is free and provides businesses with a fantastic source of information to strengthen their security posture.

Read more...



      Page 1 of 68   Next >   Last >>