Information Security



Majority of South African companies concerned about cloud security
Issue 7 2023, Infrastructure
Global and local businesses share a common concern when it comes to cloud security. 95% of global businesses and 89% of local businesses are concerned about the security of public clouds.

Read more...
Lowering the barriers to migration
Issue 7 2023, Symbiosys IT
Many businesses struggle with the complexities of user and data migration. It can be a daunting process, and it is often initially difficult to perceive a tangible return on investment.

Read more...
Strategies to address insider threats
Issue 7 2023
According to the 2022 Ponemon Cost of Insider Threats Global Report, incidents of insider threats have increased by 44% in the last two years and now account for 22% of all data breaches.

Read more...
Consolidated cybersecurity management
Issue 7 2023, Technews Publishing, Editor's Choice, Infrastructure
SMART Security Solutions spoke to Gareth Redelinghuys, Country Managing Director, African Cluster at Trend Micro, to find out what makes Trend stand out from the crowd and also its latest market offerings.

Read more...
Insider threats take centre stage
Issue 7 2023
A survey reveals that 58% of organisations believe budgets allocated to manage insider risks are insufficient to effectively mitigate the increasing costs and frequency of security incidents instigated by individuals within the organisation.

Read more...
The bossware debate
Issue 6 2023
Bossware is used mostly to track productivity and mitigate risk by monitoring email content, browser history, location, app usage and phone use through software, webcams, CCTV, GPS, fitness devices, and access control hardware.

Read more...
210 million industrial endpoints secured by 2028
Issue 6 2023, News & Events, Industrial (Industry)
A new study by Juniper Research has found that there will be growth of 107% over the next five years in the number of industrial endpoints featuring cybersecurity protection.

Read more...
Deploying genAI tools for defence
Issue 6 2023, AI & Data Analytics
Inflation, digital and technology, and cyber risks have been identified as the top three risks being prioritised for mitigation over the next 12 months by organisations in South Africa, Africa and globally.

Read more...
Does your data hygiene pass the cleanliness test?
Issue 6 2023, Infrastructure
In today’s data-driven world, where every click, swipe and tap generates a trail of data, the safeguarding of information is paramount. It’s no longer a case of paying a ransom, but rather defending against attacks by maintaining the hygiene of data.

Read more...
Executives beware of social media scammers
Issue 6 2023, News & Events
Cybercriminals have adapted their strategies to focus on executives and high-level managers; their primary objective is to obtain private photos or sensitive information that can be used for extortion and harassment.

Read more...
QR code vulnerabilities: new techniques
Issue 6 2023, News & Events
SecurityHQ analysts have recently observed a significant increase in Business Email Compromise (BEC), regarding phishing attacks containing QR codes (now called Quishing) and captchas for credentials harvesting.

Read more...
Four privacy risks in using ChatGPT for business
Issue 6 2023, AI & Data Analytics
The growing integration of chatbots in the workplace prompts a crucial question: can they be entrusted with sensitive corporate data? Kaspersky researchers have identified four key risks associated with employing ChatGPT for business purposes.

Read more...
Mimecast launches Partner ONE
Issue 6 2023, News & Events
Mimecast Partner ONE sets the foundation to simplify and scale partners’ business models and routes to market, further enhancing the partner experience while accelerating and securing the customer cybersecurity journey.

Read more...
Five things security monitoring can tell you about your business
Issue 6 2023, IoT & Automation
Security monitoring technology continuously logs and analyses data from network points and nodes, enabling security teams to detect and respond to incidents faster, but also offers a range of benefits to other groups in the business.

Read more...
The best detection and response strategy for cyber threats
Issue 6 2023
Carlo Bolzonello, the country lead for Trellix South Africa, examines some of the most common response and detection strategies and their effectiveness in managing the increasingly persistent and organised world of growing cyber risk.

Read more...
Safeguard surveillance devices from cyberattacks
Issue 6 2023, Axis Communications SA, Surveillance
Cybersecurity concerns extend through the organisation and out among its stakeholders and supply chains. It also covers video surveillance, which is critical to any organisation’s physical security and asset protection strategy.

Read more...
Winning the battle against surging cybercrime
Issue 6 2023
The latest instalment in Armata’s webinar series builds on the theme that cybersecurity threats could be material to organisations staying in business. Rapid cybercrime evolution necessitates endpoint detection and response as opposed to just anti-malware.

Read more...
Growing cyber threats to SA’s critical infrastructure
Issue 6 2023, News & Events, Industrial (Industry)
The increasing reliance on digital infrastructure makes critical sectors like utilities more susceptible to cyber threats. This concern has been highlighted by Kaspersky's recent discovery of a new SystemBC variant that has targeted a South African nation's critical infrastructure.

Read more...
Executives: Protect yourself and your business from social media scammers
Issue 6 2023
Social media scams have witnessed an alarming surge in recent years; while the most common forms of social media scams involve phishing, fake profiles, and financial fraud, a more targeted and insidious threat lurks for high-level business executives.

Read more...
Balancing promise and reality
Issue 6 2023
AI is essential for swift threat detection and response in the modern digital environment, however, solely relying on AI for cybersecurity creates a significant gap in security strategies due to the overhyped belief that AI alone can guarantee cybersecurity.

Read more...



<< First   < Previous   Page 3 of 80   Next >   Last >>