Subscribe
About
4:10

Security Navigator 2024 Report summary: What have we learned?

Cyber extortion attacks are still highly profitable for criminals, says Sara Puigvert, EVP global operations at Orange Cyberdefense.

3:10
Trellix
Dec 5, 2023

Trellix detects collaboration by cyber criminals, nation-states

The report highlights new programming languages in malware development, the adoption of malicious GenAI and the acceleration of geopolitical threat activity.

6:00
SASE
Dec 5, 2023

The alphabet soup of SASE: SWG vs CASB, FWaaS, more

Combining enterprise networking capabilities with next-generation security tools is essential when building a scalable WAN for digital transformation.

4:10
4C Group
Dec 5, 2023

Telcos can minimise data roaming fraud with iNSight

4C Group provides business assurance services to telcos, including fraud management and AML software built around its iNSight framework.

3:50
Simeon Tassev
Dec 4, 2023

Cyber insurance may have benefits, but it won’t get your stolen data back

With the rampant rise in ransomware incidents, the likelihood of an organisation being successfully breached is now extremely high.

3:50
Netskope
Dec 4, 2023

Digital trust: Why SEO poisoning is on the rise

Our automatic tendency to trust what we see on our screens, says Paolo Passeri, principal sales engineer at Netskope.

2:40

NIL Data SA, ISC2 join forces

This collaboration will provide IT professionals across sub-Saharan Africa with access to cyber security learning resources and certifications.

10:50

Cyber extortion victims increase 46% worldwide in 2023

Large enterprises (40%) are impacted the most by cyber extortion, followed by small organisations (25%) and medium-sized businesses (23%).

5:00
TransUnion
Nov 30, 2023

InfoReg demands answers from TransUnion, Experian on alleged hack

The Information Regulator wants the credit bureaus to show it exactly how they came to the conclusion that they were not hacked for a second time.

5:00
Cradlepoint
Nov 30, 2023

How does IOT tunnelling relate to zero trust networking?

The increasing importance of IOT security has enterprises searching for the best ways – often involving zero trust principles – to establish secure connections.

3:10
VMware
Nov 29, 2023

Six strategies to mitigate VMware vulnerabilities

Strategix has a VMware Vulnerability Checker that can be used to instantly assess your environment.

2:50
Netskope
Nov 29, 2023

Five threat predictions to note for 2024

AI and machine learning will be used in future cyber security attacks to generate realistic phishing e-mails and websites.