Subscribe
About
3:00
BUI
Oct 10, 2022

BUI is solving complex business security challenges as Palo Alto Networks NextWave Platinum Innovator

BUI retains its status as a Palo Alto Networks NextWave Platinum Innovator after meeting the business, capability and performance requirements.

4:20
CICT
Oct 10, 2022

Achieving enhanced cyber security with multi-modal approach

CICT (an Elvey Group company and part of the Hudaco Group of companies) takes a multi-modal approach to cyber security.

2:50
Securicom
Oct 7, 2022

Securicom obtains Fortinet’s Engage Preferred Services Partner designation

This designation demonstrates Securicom’s ability to deploy, operate and maintain end-to-end security solutions that protect customers’ investments.

4:40
Total trust
Oct 7, 2022

‘Total trust’ versus zero trust

Exclusive Networks Africa proposes a different digital future while embracing a services model, says Anton Jacobsz, MD at Exclusive Networks Africa.

4:30

File upload protection – 10 best practices for preventing cyber attacks

By limiting the list of allowed file types, you can avoid executables, scripts and other potentially malicious content from being uploaded to your application.

3:50
Cellebrite
Oct 5, 2022

A new era: Three ways to secure your home office

One of the biggest mistakes work-from-home professionals make is assuming they are not worthy of a cyber attack, says Cellebrite's Heather Mahalik.

3:00
Kaspersky
Oct 5, 2022

Middle Eastern APT group DeftTorero deploys new tactics

APT groups are highly creative when it comes to evading detection, says Kaspersky.

4:50

Lack of cyber awareness training is the weakest link in security strategies – not employees

Cyber awareness training that is effective at changing behaviour can reduce companies’ risk of cyber threats by 70%, says Isabel Adams, people enablement director at AVeS Cyber Security.

2:40
CyberArk
Oct 4, 2022

CyberArk wins 2022 SC Award for Best Identity Management Solution

Products in the Best Identity Management Solution category address the identity management life cycle in an enterprise environment.

4:50
RadixTrie
Oct 3, 2022

Isn’t it time we put cyber security in the spotlight in SA?

A secure database offers a layer of protection for data, applications and associated management systems.

2:10
KB4-CON EMEA
Oct 3, 2022

Traditional approaches to cyber security awareness no longer enough

KB4-CON EMEA will address the human firewall weaknesses, looking at new approaches to training and awareness.

2:40
NullMixer
Sept 30, 2022

NullMixer infects PCs with multiple malware types

Some 47 500 users attempting to download cracked software from third-party sites fell victim to the malware.