The systems integrator concludes an agreement to acquire privately-owned MMC for an undisclosed sum.
Organisations in critical infrastructure sectors must be positioned to combat accelerating industrial control system attacks, says Dean Parsons, SANS certified ICS instructor, CEO and principal consultant of ICS Defense Force.
Fortinet’s Secure Networking Portfolio and FortiOS 7.4 enable unified management and analytics across its secure networking portfolio.
APIs are crucial to digital services because they enable different applications to share data and 'talk' to each other, says Avash Maharaj, head of infrastructure, cloud and security at Blue Turtle Technologies.
Machine identities are the foundation of the entire cyber security landscape, says Altron Security's Michael Horn.
In a world of ever-evolving cyber threats, a unified, effective defence strategy is paramount, says Chester Wisniewski, Field CTO Applied Research at Sophos.
Cloud threat modelling across the attacker’s life cycle will unveil potential vulnerabilities and establish proactive security mitigations.
Printers can be set to electronically ‘shred’ information stored on the hard disk as part of its routine processing.
Wolfpack Information Risk's research report will be released on 20 April.
Impact Amplifier invites social innovators to submit entries for the Africa Online Safety Fund.
While the Cyber Crimes Act criminalises sextortion and cyber bullying, these incidents often go unreported, says the CSIR.