Local cybersecurity pressures on the rise
The cybersecurity sector in South Africa continues to grow at pace – with a compound annual growth rate (CAGR) of 12,97 percent between 2023...
J2 Software partners with IMechE to enhance email security with Mimecast...
J2 Software, a leading provider of cyber security solutions, proudly announces its partnership with the Institution of Mechanical Engineers (IMechE), a non-profit organisation, to...
Spyware attacks on organisations in South Africa, Kenya and Nigeria increased...
Spyware continues to be a threat to users of different types of devices, including thin clients.
LAGOS, Nigeria, May 15, 2023/ -- As discussed during...
Mauritius remains attractive to South Africans looking for lifestyle, property and...
Mauritius remains attractive to South Africans looking for lifestyle, property and investments security
As more South Africans seek a change of scenery to live, work...
Protect and secure your data dynamically
Protect and secure your data dynamically
SLVA CyberSecurity and Active Cypher's data protection and control solution works across all systems, protecting data at rest, in...
Leveraging SASE to deliver better security for a hybrid workforce
Leveraging SASE to deliver better security for a hybrid workforce
Brendan Maccarron, Palo Alto Networks Channel Manager at Westcon-Comstor Sub-Saharan Africa
With more than 40% of...
An ISO’s insider tips to secure your business
An ISO's insider tips to secure your business
South Africa is the third most targeted country in the world for cyber criminals – not necessarily...
Backdoors and open windows: The need for “baked-in” cybersecurity
Backdoors and open windows: The need for “baked-in” cybersecurityBy Deshni Harricharan - Head of Enterprise Sales at SEACOMAs South Africa and the continent continue...
Westcon-Comstor ushers in a new age of secure operations centre
Westcon-Comstor Heralds Era of Next-Gen SOC with Local Availability of Palo Alto Networks Cortex XSIAM
Johannesburg, South Africa, 26 October 2022: Westcon-Comstor Sub-Saharan Africa, a...
Keypoint Intelligence validates Kyocera’s security strength
Keypoint Intelligence validates Kyocera's security strength
Nine A3 MFP Kyocera devices in the TASKalfa 3554ci series have passed Keypoint Intelligence's rigorous BLI Security Validation Test...
Cybersecurity as important as physical security to protect the ‘crown jewels’...
Cybersecurity as important as physical security to protect the 'crown jewels' of business
Cybersecurity is possibly even more important than locks, vaults and walls in...
SLVA Cybersecurity and ContraForce partner to offer cutting-edge Security Operations technology...
SLVA Cybersecurity and ContraForce partner to offer cutting-edge Security Operations technology for SMEs
SLVA Cybersecurity, in collaboration with ContraForce are bringing enterprise-scale cyber security to...
Digital security for the new entrepreneur
Digital security for the new entrepreneur
As South Africa's entrepreneurial spirit blossoms, digital security is more important than ever, warns Steve Flynn, Sales and Marketing...
SCP SECURITY: WHAT TO LOOK FOR AND QUESTIONS TO ASK BEFORE...
SCP SECURITY: WHAT TO LOOK FOR AND QUESTIONS TO ASK BEFORE JOINING A SECURITY COMPANY
SCP Security, a highly efficient 24/7 Security business providing Armed...
CYBERATTACKS: HOW TO CHOOSE THE CORRECT IT PROVIDER
SEVENC | CYBERATTACKS: HOW TO CHOOSE THE CORRECT IT PROVIDER FOR YOUR CYBERSECURITY NEEDS
SevenC, a leading IT infrastructure and network service provider striving to...