Subscribe
About
6:00
SASE
Dec 5, 2023

The alphabet soup of SASE: SWG vs CASB, FWaaS, more

Combining enterprise networking capabilities with next-generation security tools is essential when building a scalable WAN for digital transformation.

4:10
4C Group
Dec 5, 2023

Telcos can minimise data roaming fraud with iNSight

4C Group provides business assurance services to telcos, including fraud management and AML software built around its iNSight framework.

3:50
Simeon Tassev
Dec 4, 2023

Cyber insurance may have benefits, but it won’t get your stolen data back

With the rampant rise in ransomware incidents, the likelihood of an organisation being successfully breached is now extremely high.

3:50
Netskope
Dec 4, 2023

Digital trust: Why SEO poisoning is on the rise

Our automatic tendency to trust what we see on our screens, says Paolo Passeri, principal sales engineer at Netskope.

2:40

NIL Data SA, ISC2 join forces

This collaboration will provide IT professionals across sub-Saharan Africa with access to cyber security learning resources and certifications.

10:50

Cyber extortion victims increase 46% worldwide in 2023

Large enterprises (40%) are impacted the most by cyber extortion, followed by small organisations (25%) and medium-sized businesses (23%).

5:00
TransUnion
Nov 30, 2023

InfoReg demands answers from TransUnion, Experian on alleged hack

The Information Regulator wants the credit bureaus to show it exactly how they came to the conclusion that they were not hacked for a second time.

5:00
Cradlepoint
Nov 30, 2023

How does IOT tunnelling relate to zero trust networking?

The increasing importance of IOT security has enterprises searching for the best ways – often involving zero trust principles – to establish secure connections.

3:10
VMware
Nov 29, 2023

Six strategies to mitigate VMware vulnerabilities

Strategix has a VMware Vulnerability Checker that can be used to instantly assess your environment.

2:50
Netskope
Nov 29, 2023

Five threat predictions to note for 2024

AI and machine learning will be used in future cyber security attacks to generate realistic phishing e-mails and websites.

0:30
Cloudflare
Nov 29, 2023

White paper: How to stop business e-mail compromise threats

Advanced techniques for fighting financial phishing fraud.

5:30
Trellix
Nov 28, 2023

Trellix, Illumio offer advice on how to defeat ransomware

Trellix is partnering with Illumio on a series of Ransomware Detection and Response Workshops this December in the US.