Cybersecurity and data sovereignty concerns are top drivers for public sector’s...
Research highlights the cloud plans, priorities, challenges, and experiences of IT professionals in the public sector around the world
London, UK – 28th June, 2023...
Safeguarding businesses from cybercriminal recruitment and payment fraud
While implementing internal controls to protect organisations from fraud and cybercrime takes time, it is imperative that strict controls are in place to mitigate...
Ransomware, loadshedding make healthcare incident response planning a matter of life...
Ransomware attacks are the most disruptive and destructive type of cyber incidents threatening healthcare, with clear impacts on the systemic functioning of hospitals in...
True cyber resilience is a business enabler
Cyber resilience is about much more than just cybersecurity. It’s about preventing operational disruptions of all kinds, that may impact your profitability, productivity, and...
Reducing cyber risk with next-gen technology
JOHANNESBURG - May 29, 2023 - The attack surface within the cybersecurity landscape is ever expanding and gaining in complexity, meaning that today, the securing...
A better way to prioritise vulnerability management
Digital transformation offers enormous benefits, but equally increases the security threats faced. Continuous Threat Exposure Management, first coined by Gartner, is one of the...
Staying safe on WhatsApp as scammers eye SA’s most popular messaging...
With more than 2 billion users globally and 23 million users in South Africa, WhatsApp continues to dominate as one of the world's most...
Spyware attacks on organisations in South Africa, Kenya and Nigeria increased...
Spyware continues to be a threat to users of different types of devices, including thin clients.
LAGOS, Nigeria, May 15, 2023/ -- As discussed during...
On A Budget? How To Protect Your Business From Cybercrime
Keeping any business secure is a tough but necessary task, particularly for smaller businesses that don’t always have the funds to put sufficient security...
LogRhythm Partners with eFinance to Strengthen Egypt’s Digital Payment Security Ecosystem
The partnership is enabling FinTech innovation by safely delivering integrated, customizable and scalable digital payment platforms throughout Egypt
Cairo, Egypt, 02 May 2023 - LogRhythm, the...
Immutability to combat ransomware in 2023
Tunde Abagun, Channel Sales Manager at Nutanix Sub-Saharan Africa
Data is the lifeblood of today's enterprises and an extremely lucrative target for attackers. Ransomware, which...
Nucleon Security to showcase its latest innovations at GITEX Africa 2023
With attendees from across Africa and around the world, the event will provide unprecedented networking and collaboration opportunities for Nucleon Security
PARIS, France, April 17,...
Data security during loadshedding: what should you know?
Everything is going fine, but then the power cuts out. No problem, your employees have laptops, and backup systems keep PCs running. But what...
Cybersecurity budgets: The delicate balance of spending money to save money
Cybersecurity budgets: The delicate balance of spending money to save money
Allocating sufficient budget to cyber threats can be a complex issue that requires the...
Cybersecurity: Liquid C2 launches third Cyber Security Fusion Centre in Zambia
Liquid C2 launches third Cyber Security Fusion Centre in ZambiaThe Centre will offer comprehensive cyber security services, including threat intelligence, detection, and incident response
LUSAKA,...