Predicted trends for 2024 include legislation on AI, ransomware attacks to...
Utrecht, Netherlands - KnowBe4, the provider of the world’s largest security awareness training and simulated phishing platform, announced its 2024 cybersecurity predictions for Europe, the...
Is password-based security ending
The password is no longer a fortress in and of itself. In a landscape where attackers effortlessly bypass traditional defences, passwords have become more...
SA’s strained, loadshedding-prone grid faces mounting cyber threats – smart meters...
South Africa's energy sector, already battered by decades of underinvestment and loadshedding, faces another escalating crisis: a wave of cyber threats that could turn...
Kaspersky opens its first Transparency Center in the African region
Kaspersky opens its first Transparency Center in the African regionThe new Transparency Center in Kigali is available for Kaspersky's partners, customers, and regulators responsible...
Financial Industry Ranks Second in Most Hybrid Multicloud Deployments
Research highlights the cloud plans, priorities, challenges, and experiences of IT professionals in the financial services industry around the world
Nutanix, Inc. (NASDAQ: NTNX), a leader in...
Activator HQ releases Africa’s Top 100 Business Opportunities to Watch in...
Activator HQ releases Africa's Top 100 Business Opportunities to Watch in 2024The new edition includes waste-to-energy plants, diaspora investment funds, solar-powered cold storage, digital...
SA’s strained, loadshedding-prone grid faces mounting cyber threats – smart meters...
South Africa's energy sector, already battered by decades of underinvestment and loadshedding, faces another escalating crisis: a wave of cyber threats that could turn...
Data security during loadshedding: what should you know?
Everything is going fine, but then the power cuts out. No problem, your employees have laptops, and backup systems keep PCs running. But what...
What Does Agentic AI Mean for Cybersecurity?
Johannesburg, 29 April25: If you've ever felt frustrated booking trips, finding troubleshooting information, coordinating complex supply chains, or managing any elaborate environment, you'll be interested...
J2 Software wins award and becomes first global accredited Mimecast partner
J2 Software wins award and becomes first global accredited Mimecast partner
Cybersecurity firm J2 Software has been awarded the prestigious Mimecast EMEA Customer Excellence of...
SOFTSWISS steps onto the South African tech stage as a sponsor...
Cape Town, South Africa – Global tech company SOFTSWISS is making its first major public debut in South Africa as a proud sponsor of Africa Tech...
From Garage to Cybersecurity Titan: ESET Southern Africa Celebrates 20 Years
From Garage to Cybersecurity Titan: ESET Southern Africa Celebrates its 20-Year Journey in Shaping the South African Digital Landscape
Three web-generations ago, when the word...
Exploring Digital Immunity: the next goal for cyber security
By Gary Jardim, Sales & Marketing Manager at Triple4 Global
Amid rapid change and evolution of cyber risk, traditional approaches to cyber security and cyber...
NETSCOUT DEFENDS CUSTOMERS FROM CYBERATTACKS WITH AUTOMATED, REAL-TIME TRAFFIC ANALYSIS, GLOBAL...
Adaptive DDoS Protection for Arbor TMS Dramatically ImprovesDynamic Distributed Attack Detection Including Carpet Bombing
WESTFORD, Mass. –
NETSCOUT SYSTEMS, INC. (NASDAQ: NTCT), a leading provider of...
Cyber threats on the rise: Businesses urged to ramp up defences
The rise of cyberattacks using old tricks and proven methods is expected to continue. Criminal organisations are relentlessly seeking access to your systems, aiming...