Subscribe
About
1:40

Report: Combating digital identity fraud in Africa

Trends, tactics and solutions needed to tackle fraud effectively.

4:50
Zero Trust
Jan 19, 2024

Zero trust and (why it isn’t always about) identity

It’s not just who you are, but what device you’re using, says Neil Thacker, CISO EMEA at Netskope.

5:20
Adobe Acrobat
Jan 18, 2024

IT managers rate data security as their biggest concern

Adobe Acrobat's Protected Mode and JavaScript Security features provide a secure environment for PDF creation, editing and sharing.

1:10
Ebook
Jan 18, 2024

eBook: Client data could cost you your business

Why your database strategy matters more than ever.

2:30
NEC XON
Jan 17, 2024

Embracing identity-centric zero trust: A glimpse into the future of the modern cyber security perimeter

Identity-centric zero trust builds on zero trust principles, making user identity the new perimeter, says Michael de Neuilly Rice, cyber security architect at NEC XON.

3:50
Datacentrix
Jan 16, 2024

Building a framework for effective, agile endpoint security

Agile endpoint security measures, which can adapt quickly to the changing attack landscape, are paramount for ensuring an effective first line of defence, says Gideon Viljoen, pre-sales specialist: ICT security at Datacentrix

4:30
Kaspersky
Jan 11, 2024

Insider cyber threats hamper SA firms

Kaspersky reveals 11% of cyber incidents in South African companies were caused by employees' deliberate malicious behaviour.

8:00

Industrial control systems cyber threats and the Gulf region Part 1

The SANS course, ICS515: ICS Visibility, Detection and Response, meets several modern ICS security challenges head-on, says Dean Parsons, SANS Certified Instructor.

2:50
INSIGHTS ONLINE
Jan 10, 2024

Exploring the physical security landscape of SA at INSIGHTS ONLINE

The INSIGHTS ONLINE conference, taking place on 8 February, will help to future-proof and grow businesses in SA.

1:20

City of Ekurhuleni warns of social media jobs scam

The city cautions the public not to respond to offers of employment on social media, stressing that their positions are strictly advertised on official channels.

3:30

Leveraging expertise in cyber security: A conversation with Rimmon Kisten of ICON Information Systems

The company's objective is to empower businesses with robust tools and strategies to safeguard against digital threats, says Rimmon Kisten, founder and MD of ICON Information Systems.

1:00

Deputy minister Kekana victim of fake TikTok account

The Department of Planning, Monitoring and Evaluation warns public of fake TikTok account purporting to belong to deputy minister Pinky Kekana.