NETSCOUT DEFENDS CUSTOMERS FROM CYBERATTACKS WITH AUTOMATED, REAL-TIME TRAFFIC ANALYSIS, GLOBAL...
Adaptive DDoS Protection for Arbor TMS Dramatically ImprovesDynamic Distributed Attack Detection Including Carpet Bombing
WESTFORD, Mass. –
NETSCOUT SYSTEMS, INC. (NASDAQ: NTCT), a leading provider of...
African businesses beware! Everything you need to know about mitigating escalating...
African businesses beware! Everything you need to know about mitigating escalating DDoS cyberattacks
By Bryan Hamman, regional director: Africa, NETSCOUT
JOHANNESBURG – September 12, 2023 –...
Online scams in Africa: KnowBe4 report reveals how cybercriminals trick their...
Online scams in Africa: KnowBe4 report reveals how cybercriminals trick their victims53% of the respondents who fell victim, were convinced the offer was legitimate...
Security in a Hybrid Work Era: Why A Secure Hybrid Work...
Security in a Hybrid Work Era: Why A Secure Hybrid Work Solution is the Future
By Donovan Couve, Business Practice Lead Comstor Cisco, Westcon-Comstor Southern...
From overwhelm to oversight: How ContraForce is revolutionising security automation
From overwhelm to oversight: How ContraForce is revolutionising security automation
Security automation is vital in today’s world and Microsoft Sentinel is a widely adopted, but...
Patch, protect, insure: ESET introduces proactive vulnerability and patch management
Patch, protect, insure: ESET introduces proactive vulnerability and patch management
Keeping your company safe from potential vulnerabilities is not only better for business, it also...
SA Is A Cybercrime Hub: Has Your Business Planned For The...
SA Is A Cybercrime Hub: Has Your Business Planned For The Worst?
Johannesburg, 17 August 2023: Cybercrime might not get the same attention as contact...
Trend Introduces Optimised Security for Endpoints, Servers, and Cloud Workloads to...
Trend Introduces Optimised Security for Endpoints, Servers, and Cloud Workloads to Cybersecurity PlatformSingle platform delivery designed to consolidate protection, detection, and response and streamline...
Africa remains phishing prone, but ongoing training slashes risk
Africa remains phishing prone, but ongoing training slashes riskThe report is based on data from over 12.5 million users across 35,681 organisations in 19...
State of Edge Security – Research Report
The State of Edge Security ReportRosa Guntrip, Senior Manager, OpenShift Product Marketing
Edge computing has grown from being a niche use case in a handful...
Microsoft Cyber Signals points to prevalence of cyberthreats at large-scale sporting...
Microsoft Cyber Signals points to prevalence of cyberthreats at large-scale sporting events
New research from Microsoft offers first-hand learnings about how threat actors assess and...
Why you need a cyber last line of defence
Why you need a cyber last line of defence
To truly secure your business from the growing threat of ransomware, you need a solution that...
New IBA report provides first-of-its-kind global perspective on cybersecurity risk governance
A new report from the International Bar Association (IBA) Presidential Task Force on Cybersecurity and the IBA Legal Policy & Research Unit (LPRU) provides a first-of-its-kind global perspective on key...
Navigating the cybersecurity landscape: Trends to watch out for in the...
by J2 Software CEO John Mc Loughlin
The second half of 2023 holds significant implications for businesses worldwide as the landscape of cybersecurity continues to...
Infinetix and Blackshots partner to achieve inclusive digital vision
System integration company, Infinetix, and investment company, Blackshots, have partnered to expand Infinetix's footprint in South Africa and further afield. Both are focused on...