Mastering the mindset: How to think like a hacker and stay...
By Dale de Kok, Systems Engineer at Fortinet
In today’s rapidly developing digital landscape, cyber security teams must move away from purely reactive defence measures...
Tackling payment fraud head-on in South Africa’s mining and construction industries
As one of the top ten mining countries in the world, South Africa's economy relies heavily on this industry as well as those closely related to...
Threat actors add .zip domains to their Phishing arsenals
By Jonas Walker, Director of Threat Intelligence, FortiGuard Labs, and Fred Gutierrez, Senior Security Engineer, Fortinet
Phishing has been a digital thorn in the side...
Corridor Africa Technologies takes the lead in transforming South Africa’s mobile...
Corridor Africa Technologies, a leading provider of telecommunications solutions, is poised to lead the digital transformation of mobile networks in South Africa in response...
Financial Industry Ranks Second in Most Hybrid Multicloud Deployments
Research highlights the cloud plans, priorities, challenges, and experiences of IT professionals in the financial services industry around the world
Nutanix, Inc. (NASDAQ: NTNX), a leader in...
The human element: Why employee mistakes are the biggest cybersecurity threat...
With almost 88% of data breaches being caused by an employee mistake, a strong human risk management programme with regular employee training and cybersecurity...
Exploring Digital Immunity: the next goal for cyber security
By Gary Jardim, Sales & Marketing Manager at Triple4 Global
Amid rapid change and evolution of cyber risk, traditional approaches to cyber security and cyber...
Boosting cybersecurity with robust digital risk assessment tools
Cybersecurity, and the cyber insurance that provides cover against cyber attacks, can both be significantly boosted by building a strong cyber risk profile that...
Zero Trust: A Paradigm Shift in Cybersecurity
In today's digital landscape, organisations face a constant barrage of cyber threats. Traditional perimeter-based security measures are no longer sufficient in safeguarding sensitive data...
The sky’s the limit for cloud security
By Jan Bouwer, Chief of Digital Platform Solutions at BCX
The digital era has opened new vistas for individuals and businesses with cloud computing being...
How to fortify your data in the event of a ransomware...
Of the 85% of companies that experienced ransomware attacks in the past year, only 19% were able to recover their data without paying the...
J2 Software partners with IMechE to enhance email security with Mimecast...
J2 Software, a leading provider of cyber security solutions, proudly announces its partnership with the Institution of Mechanical Engineers (IMechE), a non-profit organisation, to...
Cybersecurity and data sovereignty concerns are top drivers for public sector’s...
Research highlights the cloud plans, priorities, challenges, and experiences of IT professionals in the public sector around the world
London, UK – 28th June, 2023...
Safeguarding businesses from cybercriminal recruitment and payment fraud
While implementing internal controls to protect organisations from fraud and cybercrime takes time, it is imperative that strict controls are in place to mitigate...
Ransomware, loadshedding make healthcare incident response planning a matter of life...
Ransomware attacks are the most disruptive and destructive type of cyber incidents threatening healthcare, with clear impacts on the systemic functioning of hospitals in...