Subscribe
About
5:20
J2 SoftwareJan 25, 2024

Modern business security: The power of unified cloud protection

SSE brings security closer to users and applications, allowing proactive threat detection, real-time monitoring and rapid response to potential security incidents, says John Mc Loughlin, CEO of J2 Software.

4:40
CyberArkJan 24, 2024

How AI is expanding the attack surface

The interconnectedness of systems and the rapid adoption of new technologies has further complicated the task of securing companies, says Len Noe, technical evangelist and white hat hacker at CyberArk.

1:40

Report: Combating digital identity fraud in Africa

Trends, tactics and solutions needed to tackle fraud effectively.

4:50
Zero TrustJan 19, 2024

Zero trust and (why it isn’t always about) identity

It’s not just who you are, but what device you’re using, says Neil Thacker, CISO EMEA at Netskope.

5:20
Adobe AcrobatJan 18, 2024

IT managers rate data security as their biggest concern

Adobe Acrobat's Protected Mode and JavaScript Security features provide a secure environment for PDF creation, editing and sharing.

1:10
EbookJan 18, 2024

eBook: Client data could cost you your business

Why your database strategy matters more than ever.

2:30
NEC XONJan 17, 2024

Embracing identity-centric zero trust: A glimpse into the future of the modern cyber security perimeter

Identity-centric zero trust builds on zero trust principles, making user identity the new perimeter, says Michael de Neuilly Rice, cyber security architect at NEC XON.

3:50
DatacentrixJan 16, 2024

Building a framework for effective, agile endpoint security

Agile endpoint security measures, which can adapt quickly to the changing attack landscape, are paramount for ensuring an effective first line of defence, says Gideon Viljoen, pre-sales specialist: ICT security at Datacentrix

4:30
KasperskyJan 11, 2024

Insider cyber threats hamper SA firms

Kaspersky reveals 11% of cyber incidents in South African companies were caused by employees' deliberate malicious behaviour.

8:00

Industrial control systems cyber threats and the Gulf region Part 1

The SANS course, ICS515: ICS Visibility, Detection and Response, meets several modern ICS security challenges head-on, says Dean Parsons, SANS Certified Instructor.

2:50
INSIGHTS ONLINEJan 10, 2024

Exploring the physical security landscape of SA at INSIGHTS ONLINE

The INSIGHTS ONLINE conference, taking place on 8 February, will help to future-proof and grow businesses in SA.

1:20

City of Ekurhuleni warns of social media jobs scam

The city cautions the public not to respond to offers of employment on social media, stressing that their positions are strictly advertised on official channels.