Subscribe
About
2:10
AON
Jan 29, 2024

E-mail interception fraud on the rise in South Africa

Cyber criminals are exploiting emerging tech to launch increasingly sophisticated phishing attacks, warns Aon.

4:40
Voice biometrics
Jan 29, 2024

Is voice biometrics in banking secure enough?

As voice cloning becomes a viable threat, financial institutions need to be aware of the possibility of fraud in voice-based interfaces, says Gur Geva, CEO of iiDENTIFii.

4:50

Netskope Threat Labs: Attackers taking notice as GenAI app usage among enterprise employees increases by 400%

New research details major growth of generative AI adoption, cloud app risks, top threats and adversaries throughout 2023.

5:20
J2 Software
Jan 25, 2024

Modern business security: The power of unified cloud protection

SSE brings security closer to users and applications, allowing proactive threat detection, real-time monitoring and rapid response to potential security incidents, says John Mc Loughlin, CEO of J2 Software.

4:40
CyberArk
Jan 24, 2024

How AI is expanding the attack surface

The interconnectedness of systems and the rapid adoption of new technologies has further complicated the task of securing companies, says Len Noe, technical evangelist and white hat hacker at CyberArk.

1:40

Report: Combating digital identity fraud in Africa

Trends, tactics and solutions needed to tackle fraud effectively.

4:50
Zero Trust
Jan 19, 2024

Zero trust and (why it isn’t always about) identity

It’s not just who you are, but what device you’re using, says Neil Thacker, CISO EMEA at Netskope.

5:20
Adobe Acrobat
Jan 18, 2024

IT managers rate data security as their biggest concern

Adobe Acrobat's Protected Mode and JavaScript Security features provide a secure environment for PDF creation, editing and sharing.

1:10
Ebook
Jan 18, 2024

eBook: Client data could cost you your business

Why your database strategy matters more than ever.

2:30
NEC XON
Jan 17, 2024

Embracing identity-centric zero trust: A glimpse into the future of the modern cyber security perimeter

Identity-centric zero trust builds on zero trust principles, making user identity the new perimeter, says Michael de Neuilly Rice, cyber security architect at NEC XON.

3:50
Datacentrix
Jan 16, 2024

Building a framework for effective, agile endpoint security

Agile endpoint security measures, which can adapt quickly to the changing attack landscape, are paramount for ensuring an effective first line of defence, says Gideon Viljoen, pre-sales specialist: ICT security at Datacentrix

4:30
Kaspersky
Jan 11, 2024

Insider cyber threats hamper SA firms

Kaspersky reveals 11% of cyber incidents in South African companies were caused by employees' deliberate malicious behaviour.