95% of cyber issues caused by human error
Emotion vs. Security: How hackers exploit our vulnerabilities
Distractions, multi-tasking, and emotional responses increase individuals’ vulnerability to social engineering, manipulation, and various forms of digital...
Xperien advocates ethical governance in the refurbished IT industry
Xperien advocates ethical governance in the refurbished IT industry
Xperien, a leading IT Asset Disposal (ITAD) company, is taking a bold stance on ethical governance...
A new all-in-one offering for household digital protection
ESET, a global leader in cybersecurity, has announced the launch of its new innovative and streamlined offering for South African consumers. With more than...
Online scams in Africa: KnowBe4 report reveals how cybercriminals trick their...
Key findings:
40% of the respondents from eight countries had been scammed onlineDistraction and multi-tasking made 43% of the victims fall for an online scamFinancial...
Black Friday bargains or fraud traps: The risks of tap and...
Global contactless purchases are expected to more than quadruple between now and 2027. This significant growth will mainly be driven by payment-enabled mobile devices,...
Rethinking security: Why on-premise Is no longer enough
Traditional companies often cling to on-premise infrastructure, believing it to be the safest solution. However, recent evidence suggests that the paradigm is shifting, with...
The Hunter, not the Hunted: Redefining Security in the Age of...
Bertus Engelbrecht, Senior Manager: Information Security at BCX, talks about the cybersecurity threat landscape in 2023 and how the rise of artificial intelligence, automation...
INNOVATIVE NETSCOUT SOLUTION PROTECTS CUSTOMERS FROM CYBERATTACKS
WESTFORD, Mass. – November 10, 2023 -- NETSCOUT SYSTEMS, INC. (NASDAQ: NTCT), a leading provider of performance management, cybersecurity, and DDoS attack protection solutions, has...
How to future proof against AI security threats
Johannesburg, What a difference a year makes! Before 2023, artificial intelligence (AI) was primarily a subject for movies, business analytics, or sophisticated background applications....
Turning the browser into a security endpoint
As a consumer application, the web browser has long created security challenges for enterprises. The Enterprise Browser is set to change that, says Patrick...
Security measures to effectively manage public unrest
Security - In recent months, South Africans have been impacted by protests, riots, and incidents of public violence stemming from a lack of service delivery....
Global conflict threatens local war on hunger warns development group
Agripreneurship: a solution to enhance food security as global conflict proves a recurring threat to SA's vulnerable food supply chain.
October 2023: Recent global conflicts...
Securing the hybrid cloud is a balancing act for SA businesses
To protect data and other digital assets in hybrid cloud environments, businesses need to adopt a modernised, flexible and scalable cybersecurity approach. While small...
Smart Obsession: Cities Within Security
Rebatho Madiba from BCX explores the security and connectivity considerations that define the development of smart city foundations.
The smart city has become a global...
One phrase to keep you secure: Is It Legit?
A little healthy suspicion can stop phishing attacks.
Johannesburg,
Your shipment is waiting, but it needs your approval. Your subscription payment has failed, but your loyalty...