Subscribe
About
5:00
ISSC Group
Sept 18, 2023

Shift to integrated threat protection

SecOps teams are overwhelmed by the quantity of signals they must analyse, says Emil Henrico, CEO at iSSC Group.

5:00
Datacentrix
Sept 18, 2023

How to mitigate (and recover from) rising African cyber incidents

Companies must ensure the right strategic steps are in place to minimise the damage caused by a cyber attack, says Brian Smith, business unit manager at Datacentrix.

0:30

Guide: Comprehensive Office 365 Email Encryption Security Strategy

Explore the built-in e-mail security features of Microsoft Office 365.

3:10
Chi
Sept 12, 2023

CHI selects NEC XON as trusted cyber security partner

The collaboration aims to bolster CHI's cyber security abilities, ensuring enhanced and proactive protection against evolving cyber threats.

3:20

Obscure Technologies announces platinum sponsorship of BSides Cape Town event

The BSides event is a community-driven non-profit framework for building events for and by information security community members.

4:30
Rockstar Games
Sept 12, 2023

Defending the future: What does tomorrow's cyber security look like?

For all the emphasis on automation and artificial intelligence, humans are the secret weapon in securing the future, says Nexio.

2:50
Irina Artioli
Sept 11, 2023

Prevention better than cure in battling AI-driven ransomware

Companies should have an advanced solution that uses ML and AI against cyber criminals, says Irina Artioli, cyber protection evangelist at Acronis.

4:00
Cyber adversaries
Sept 7, 2023

Six effective antidotes to modern cyber adversaries

Reduce your perimeter and minimise internet-facing systems to limit the attack surface, says Armand Kruger, head of cyber security at NEC XON.

4:50
HP Wolf Security
Sept 7, 2023

Lego-style cyber attacks test already strained defences

HP says cyber criminals are launching building-block style attacks to evade detection tools.

1:40
Alfahive
Sept 7, 2023

Alfahive, Wolfpack Information Risk join forces

This collaboration will bring together technology and cyber security domain expertise to drive automation in cyber risk management.

5:00
Binance
Sept 7, 2023

Safe from account takeover attacks

ATO attacks occur when an attacker gains unauthorised access to a victim’s online account, usually by stealing their login credentials.

2:20
WithSecure
Sept 6, 2023

WithSecure, Mend.io patch vulnerability in popular application security platform

The vulnerability could have exposed potentially compromising security information about Mend.io customers.