Africa urged to adopt unified communications technology for enhanced cyber security at events.
Obscure Technologies and Palo Alto Networks provide the solution to the deployment of multiple firewalls across various locations.
Data breaches remain one of the most concerning threats in cloud security, says Altron Arrow.
This week’s tenders see the departments of transport, tourism, public works and National Treasury make direct appeals to the ICT sector.
The new features digitise processes that are traditionally manual and paper based, or require the use of multiple systems.
Nokia’s global head of security says communication service providers cannot overlook the critical importance of security.
Romance scams are prevalent schemes, where fraudsters create fake profiles on dating platforms or social media to build emotional connections with their victims.
CIS Hardened Images are software files that are preconfigured to align with the Center for Internet Security Benchmarks.
Round-the-clock security operations centres help keep clients one step ahead.
Defence-in-depth strategies, such as endpoint protection, network segmentation and regular employee training, are critical to staying ahead of attackers, says Kobus Robinson, lead solutions consultant at OpenText.
The Film and Publication Board details an uptick in online child porn material, with research showing cyber bullying is also rampant.