Subscribe
About
4:30
Andrew Moodely
Jul 18, 2022

What hot tubs tell us about derisking digital

Digital is creating more risks and companies are discovering that it's not easy to untangle those risks, says Andrew Moodely, chief digital officer at Axiz.

3:10
TechEx
Jul 18, 2022

TechEx offers cost-effective SOC as a service for SMEs

This ensures that companies, are less susceptible to being compromised by the vectors within the ever evolving and expanding threat landscape.

3:30

Fortify your data with modern security

Dell Technologies South Africa hosted a TechByte webinar on 12 July to engage with companies on how to protect their data and systems.

2:10
SYNAQ
Jul 15, 2022

SYNAQ, KellermanICT set to address cyber crime in Namibia

According to a study by Check Point Research, cyber criminals target Namibian businesses 49% more than the rest of the world.

2:50

IronTree, Sendmarc take fight to e-mail impersonators

The companies enter a strategic partnership to fight e-mail impersonation attacks on the African continent.

5:10
Irena Mroz
Jul 14, 2022

How can you create data-centric zero trust?

Zero trust typically focuses on context and behaviour, integrating numerous security, identity and monitoring services that reference contextual policies.

2:20

WithSecure brings intelligence-driven protection to defenders

WithSecure Intelligence’s blend of threat research and machine learning expertise is expected to prove vital in the fight against emerging threats.

2:50
Malibot
Jul 13, 2022

Check Point names most wanted malware

Emotet is still the most prevalent malware while Snake keylogger climbs from eighth place to third. 

1:20
Concentric
Jul 13, 2022

Concentric debuts privacy, security solution

Eclipse is designed to help individuals, families and teams mitigate digital risks.

3:10
AppGate
Jul 13, 2022

Getting down to brass tacks: what's real zero trust?

Zero trust security is the buzzword of the day, but not every vendor that claims zero trust is delivering real zero trust, says Michael Friedrich, VP, Federal Technical Strategy and Innovation at Appgate.

1:30

Business e-mail compromise scammers jailed for fraud

The cyber criminals were sentenced to 12 years and seven years, respectively, for theft, fraud and money-laundering.

2:20

Go zero trust with Check Point Infinity

Focused on threat prevention instead of detection, Check Point Infinity uses 64 different security engines to protect against known and unknown threats.