Subscribe
About
4:20
BlueVision ITM
Aug 14, 2024

Simulate now to prepare for future cyber action

Regular simulation sessions offer the best way of testing how ready an organisation is to respond to a cyber breach over time.

3:10
Khipu Networks
Aug 13, 2024

High-profile cyber attacks

Lessons from the latest breaches and what every business needs to know to stay safe.

3:30

Rethinking ransomware defence: BullWall’s innovative approach to containment

BullWall Ransomware Containment will isolate and shut down the user and the device that introduced the malware within seconds of the ransomware attack commencing.

5:50
Eskom
Aug 8, 2024

ITWeb TV: The woman behind Eskom’s high-stakes cyber security

The power utility blocks up to one billion cyber security incidents per month that could have turned into cyber attacks, says CISO Sithembile Songo.

1:50
Iconis
Aug 7, 2024

Identifying forgotten IT assets for weaponisation

Once at-risk assets are identified, they can be strategically weaponised to enhance security, says Jeffrey Cass, cyber security engineer at ICON Information Systems.

0:50
Ebook
Aug 5, 2024

eBook: Hunting money mules with 360-degree view of identities

A money mule is a bank account, or the holder of the account, necessary for receiving fraudulent funds so these can be transferred and cashed out.

3:00

Sable International suffers ‘sophisticated’ cyber attack

An internal investigation shows that, at this stage, a limited number of clients have had their personal data compromised, says the firm.

3:10

Addressing security sprawl

The cyber security landscape has become cluttered with vendors trying to outdo each other with confusing acronyms and overlapping features, says David Herselman, MD at inq. South Africa.

4:50
IBM
Jul 31, 2024

Data breach recovery costs in SA reach new high

The average data breach costs R53.10 million in 2024 − in business disruption, post-breach customer support and remediation.

3:30
SS-Consulting
Jul 30, 2024

Securing remote workforces: Strategies for a secure future

The transition to remote work has expanded the attack surface for cyber threats.

1:20
Cloud Essentials
Jul 29, 2024

Insider risk: Biggest threat to data security? Biggest driver for information governance change?

It’s difficult to get buy-in and budget for DLP and information security improvements until the worst happens, says Cloud Essentials.

2:10

Report: The LexisNexis Risk Solutions Cybercrime Report

Managing fraud and scams with data and analytics.