Subscribe
About
2:30

Navigating the new era of endpoint security: 4Protect-Endpoint advantage

4Protect-Endpoint is an intelligent system powered by advanced artificial intelligence, says Jeandre du Randt, BE innovation lead at 4Sight.

1:20
KasperskyDec 6, 2023

Windows a primary target for cyber attackers – Kaspersky

Microsoft’s platform accounts for 88% of all malware-filled data, according to latest stats released by the security company.

4:10

Security Navigator 2024 Report summary: What have we learned?

Cyber extortion attacks are still highly profitable for criminals, says Sara Puigvert, EVP global operations at Orange Cyberdefense.

3:10
TrellixDec 5, 2023

Trellix detects collaboration by cyber criminals, nation-states

The report highlights new programming languages in malware development, the adoption of malicious GenAI and the acceleration of geopolitical threat activity.

6:00
SASEDec 5, 2023

The alphabet soup of SASE: SWG vs CASB, FWaaS, more

Combining enterprise networking capabilities with next-generation security tools is essential when building a scalable WAN for digital transformation.

4:10
4C GroupDec 5, 2023

Telcos can minimise data roaming fraud with iNSight

4C Group provides business assurance services to telcos, including fraud management and AML software built around its iNSight framework.

3:50
Simeon TassevDec 4, 2023

Cyber insurance may have benefits, but it won’t get your stolen data back

With the rampant rise in ransomware incidents, the likelihood of an organisation being successfully breached is now extremely high.

3:50
NetskopeDec 4, 2023

Digital trust: Why SEO poisoning is on the rise

Our automatic tendency to trust what we see on our screens, says Paolo Passeri, principal sales engineer at Netskope.

2:40

NIL Data SA, ISC2 join forces

This collaboration will provide IT professionals across sub-Saharan Africa with access to cyber security learning resources and certifications.

10:50

Cyber extortion victims increase 46% worldwide in 2023

Large enterprises (40%) are impacted the most by cyber extortion, followed by small organisations (25%) and medium-sized businesses (23%).

5:00
TransUnionNov 30, 2023

InfoReg demands answers from TransUnion, Experian on alleged hack

The Information Regulator wants the credit bureaus to show it exactly how they came to the conclusion that they were not hacked for a second time.

5:00
CradlepointNov 30, 2023

How does IOT tunnelling relate to zero trust networking?

The increasing importance of IOT security has enterprises searching for the best ways – often involving zero trust principles – to establish secure connections.