Corridor Africa Technologies takes the lead in transforming South Africa’s mobile...
Corridor Africa Technologies, a leading provider of telecommunications solutions, is poised to lead the digital transformation of mobile networks in South Africa in response...
Financial Industry Ranks Second in Most Hybrid Multicloud Deployments
Research highlights the cloud plans, priorities, challenges, and experiences of IT professionals in the financial services industry around the world
Nutanix, Inc. (NASDAQ: NTNX), a leader in...
The human element: Why employee mistakes are the biggest cybersecurity threat...
With almost 88% of data breaches being caused by an employee mistake, a strong human risk management programme with regular employee training and cybersecurity...
Exploring Digital Immunity: the next goal for cyber security
By Gary Jardim, Sales & Marketing Manager at Triple4 Global
Amid rapid change and evolution of cyber risk, traditional approaches to cyber security and cyber...
Boosting cybersecurity with robust digital risk assessment tools
Cybersecurity, and the cyber insurance that provides cover against cyber attacks, can both be significantly boosted by building a strong cyber risk profile that...
Zero Trust: A Paradigm Shift in Cybersecurity
In today's digital landscape, organisations face a constant barrage of cyber threats. Traditional perimeter-based security measures are no longer sufficient in safeguarding sensitive data...
The sky’s the limit for cloud security
By Jan Bouwer, Chief of Digital Platform Solutions at BCX
The digital era has opened new vistas for individuals and businesses with cloud computing being...
How to fortify your data in the event of a ransomware...
Of the 85% of companies that experienced ransomware attacks in the past year, only 19% were able to recover their data without paying the...
J2 Software partners with IMechE to enhance email security with Mimecast...
J2 Software, a leading provider of cyber security solutions, proudly announces its partnership with the Institution of Mechanical Engineers (IMechE), a non-profit organisation, to...
Cybersecurity and data sovereignty concerns are top drivers for public sector’s...
Research highlights the cloud plans, priorities, challenges, and experiences of IT professionals in the public sector around the world
London, UK – 28th June, 2023...
Safeguarding businesses from cybercriminal recruitment and payment fraud
While implementing internal controls to protect organisations from fraud and cybercrime takes time, it is imperative that strict controls are in place to mitigate...
Ransomware, loadshedding make healthcare incident response planning a matter of life...
Ransomware attacks are the most disruptive and destructive type of cyber incidents threatening healthcare, with clear impacts on the systemic functioning of hospitals in...
True cyber resilience is a business enabler
Cyber resilience is about much more than just cybersecurity. It’s about preventing operational disruptions of all kinds, that may impact your profitability, productivity, and...
Reducing cyber risk with next-gen technology
JOHANNESBURG - May 29, 2023 - The attack surface within the cybersecurity landscape is ever expanding and gaining in complexity, meaning that today, the securing...
A better way to prioritise vulnerability management
Digital transformation offers enormous benefits, but equally increases the security threats faced. Continuous Threat Exposure Management, first coined by Gartner, is one of the...