Africa remains phishing prone, but ongoing training slashes risk
Africa remains phishing prone, but ongoing training slashes riskThe report is based on data from over 12.5 million users across 35,681 organisations in 19...
cybersecurity expert and J2 Software CEO John Mc Loughlin
Phishing, vishing, and smishing attacks have increased significantly, leveraging advanced technologies and personalised tactics to deceive individuals and organisations. These threats exploit personal information,...
Building a safer online world for South Africa’s children: Tips for...
By Julie Noizeux, Channel Manager at Fortinet
As South Africa commemorates 30 years of democracy, this year's Youth Day and Youth Month revolve around the...
The Channel’s Role in Bridging the Gap Between Cybersecurity Theory and...
Cybercrime is an escalating threat that is already costing South Africa R69 billion a year, a statistic that doesn't fully capture the hidden costs...
State of Edge Security – Research Report
The State of Edge Security ReportRosa Guntrip, Senior Manager, OpenShift Product Marketing
Edge computing has grown from being a niche use case in a handful...
Data security during loadshedding: what should you know?
Everything is going fine, but then the power cuts out. No problem, your employees have laptops, and backup systems keep PCs running. But what...
2023 predictions an even more challenging landscape
An even more challenging cybersecurity landscape is on the horizon
Lindsay Blackie, Channel Manager at Westcon-Comstor
If Check Point Software's Cybersecurity Predictions for 2023 are anything...
Stay Cybersafe This Holiday: Tips for Businesses
Cybercriminals exploit the holidays to attack businesses. Here are five steps to help your company stay secure and profitable.
Johannesburg,: It's that time of the year,...
How channel companies can simplify cyber security to build trust and...
How channel companies can simplify cyber security to build trust and agility for SMBs
By Ben Aung, Chief Risk Officer, Sage
Recent research reveals that cyber...
Digital disaster readiness: what local governments must prioritise before the next...
Disaster readiness often brings to mind physical emergencies like fires, storms, or floods. However, in the digital world, disasters are silent, invisible, and entirely...
Exabeam Appoints Mike Byron as Chief Financial Officer
Exabeam Appoints Mike Byron as Chief Financial Officer
New appointment to scale business growth and enhance profitability
BROOMFIELD, Colo. & FOSTER CITY, Calif. — Dec. 10,...
Digging deeper: cybersecurity concerns mount in mining arena
Digging deeper: cybersecurity concerns mount in mining arena
By Kyle Pillay, Security Operations Centre (SOC) Manager at Datacentrix
JOHANNESBURG – April 08, 2024 – In today's...
Breach and Attack Simulation (BAS) technology: The key to continuous cyber...
Cyber security in any industry sector with a reliance on digital is absolutely crucial. These businesses should implement technology that will help them validate...
A better way to prioritise vulnerability management
Digital transformation offers enormous benefits, but equally increases the security threats faced. Continuous Threat Exposure Management, first coined by Gartner, is one of the...
It’s beginning to look a lot like Christmas
Beware the cyber Grinches: AI-enabled criminals plot to steal Christmas
Generative AI is being harnessed by cyber criminals to enhance their social engineering efforts, making...