Threat actors add .zip domains to their Phishing arsenals

0
By Jonas Walker, Director of Threat Intelligence, FortiGuard Labs, and Fred Gutierrez, Senior Security Engineer, Fortinet Phishing has been a digital thorn in the side...

Corridor Africa Technologies takes the lead in transforming South Africa’s mobile...

0
Corridor Africa Technologies, a leading provider of telecommunications solutions, is poised to lead the digital transformation of mobile networks in South Africa in response...

Financial Industry Ranks Second in Most Hybrid Multicloud Deployments

0
Research highlights the cloud plans, priorities, challenges, and experiences of IT professionals in the financial services industry around the world  Nutanix, Inc. (NASDAQ: NTNX), a leader in...

The human element: Why employee mistakes are the biggest cybersecurity threat...

0
With almost 88% of data breaches being caused by an employee mistake, a strong human risk management programme with regular employee training and cybersecurity...

Exploring Digital Immunity: the next goal for cyber security

0
By Gary Jardim, Sales & Marketing Manager at Triple4 Global Amid rapid change and evolution of cyber risk, traditional approaches to cyber security and cyber...

Boosting cybersecurity with robust digital risk assessment tools

0
Cybersecurity, and the cyber insurance that provides cover against cyber attacks, can both be significantly boosted by building a strong cyber risk profile that...

Zero Trust: A Paradigm Shift in Cybersecurity

0
In today's digital landscape, organisations face a constant barrage of cyber threats. Traditional perimeter-based security measures are no longer sufficient in safeguarding sensitive data...

The sky’s the limit for cloud security

0
By Jan Bouwer, Chief of Digital Platform Solutions at BCX The digital era has opened new vistas for individuals and businesses with cloud computing being...

How to fortify your data in the event of a ransomware...

0
Of the 85% of companies that experienced ransomware attacks in the past year, only 19% were able to recover their data without paying the...

J2 Software partners with IMechE to enhance email security with Mimecast...

0
J2 Software, a leading provider of cyber security solutions, proudly announces its partnership with the Institution of Mechanical Engineers (IMechE), a non-profit organisation, to...

Cybersecurity and data sovereignty concerns are top drivers for public sector’s...

0
Research highlights the cloud plans, priorities, challenges, and experiences of IT professionals in the public sector around the world London, UK – 28th June, 2023...

Safeguarding businesses from cybercriminal recruitment and payment fraud

0
While implementing internal controls to protect organisations from fraud and cybercrime takes time, it is imperative that strict controls are in place to mitigate...

Ransomware, loadshedding make healthcare incident response planning a matter of life...

0
Ransomware attacks are the most disruptive and destructive type of cyber incidents threatening healthcare, with clear impacts on the systemic functioning of hospitals in...

True cyber resilience is a business enabler

0
Cyber resilience is about much more than just cybersecurity. It’s about preventing operational disruptions of all kinds, that may impact your profitability, productivity, and...

Reducing cyber risk with next-gen technology

0
JOHANNESBURG  - May 29, 2023 - The attack surface within the cybersecurity landscape is ever expanding and gaining in complexity, meaning that today, the securing...

Hayo Joins the GLF to Drive Global Digital Infrastructure Innovation

0
Hayo Joins the GLF to Collaborate with International Connectivity Leaders and Drive Global Digital Infrastructure Innovation Hayo will share insights and collaborate with GLF experts...