African businesses beware! Everything you need to know about mitigating escalating...
African businesses beware! Everything you need to know about mitigating escalating DDoS cyberattacksBy Bryan Hamman, regional director: Africa, NETSCOUTJOHANNESBURG – September 12, 2023 –...
Online scams in Africa: KnowBe4 report reveals how cybercriminals trick their...
Online scams in Africa: KnowBe4 report reveals how cybercriminals trick their victims53% of the respondents who fell victim, were convinced the offer was legitimate...
Security in a Hybrid Work Era: Why A Secure Hybrid Work...
Security in a Hybrid Work Era: Why A Secure Hybrid Work Solution is the FutureBy Donovan Couve, Business Practice Lead Comstor Cisco, Westcon-Comstor Southern...
From overwhelm to oversight: How ContraForce is revolutionising security automation
From overwhelm to oversight: How ContraForce is revolutionising security automationSecurity automation is vital in today’s world and Microsoft Sentinel is a widely adopted, but...
Patch, protect, insure: ESET introduces proactive vulnerability and patch management
Patch, protect, insure: ESET introduces proactive vulnerability and patch managementKeeping your company safe from potential vulnerabilities is not only better for business, it also...
SA Is A Cybercrime Hub: Has Your Business Planned For The...
SA Is A Cybercrime Hub: Has Your Business Planned For The Worst?Johannesburg, 17 August 2023: Cybercrime might not get the same attention as contact...
Trend Introduces Optimised Security for Endpoints, Servers, and Cloud Workloads to...
Trend Introduces Optimised Security for Endpoints, Servers, and Cloud Workloads to Cybersecurity PlatformSingle platform delivery designed to consolidate protection, detection, and response and streamline...
Africa remains phishing prone, but ongoing training slashes risk
Africa remains phishing prone, but ongoing training slashes riskThe report is based on data from over 12.5 million users across 35,681 organisations in 19...
State of Edge Security – Research Report
The State of Edge Security ReportRosa Guntrip, Senior Manager, OpenShift Product MarketingEdge computing has grown from being a niche use case in a handful...
Microsoft Cyber Signals points to prevalence of cyberthreats at large-scale sporting...
Microsoft Cyber Signals points to prevalence of cyberthreats at large-scale sporting eventsNew research from Microsoft offers first-hand learnings about how threat actors assess and...
Why you need a cyber last line of defence
Why you need a cyber last line of defenceTo truly secure your business from the growing threat of ransomware, you need a solution that...
New IBA report provides first-of-its-kind global perspective on cybersecurity risk governance
A new report from the International Bar Association (IBA) Presidential Task Force on Cybersecurity and the IBA Legal Policy & Research Unit (LPRU) provides a first-of-its-kind global perspective on key...
Navigating the cybersecurity landscape: Trends to watch out for in the...
by J2 Software CEO John Mc LoughlinThe second half of 2023 holds significant implications for businesses worldwide as the landscape of cybersecurity continues to...
Infinetix and Blackshots partner to achieve inclusive digital vision
System integration company, Infinetix, and investment company, Blackshots, have partnered to expand Infinetix's footprint in South Africa and further afield. Both are focused on...
Mastering the mindset: How to think like a hacker and stay...
By Dale de Kok, Systems Engineer at FortinetIn today’s rapidly developing digital landscape, cyber security teams must move away from purely reactive defence measures...























































