Subscribe
4:40

No trust within the network?

Strict identity verification and continuous authorisation are required for all users and devices at all times, broadening the security perimeter and boosting trust.

4:30
IDC9 May

‘Complacent’ security investment rings alarm bells

Planned investment in security slumps, due to complacency that needs to be addressed quite sharply, says IDC.

2:30

Combating foreign interference

The 2024 Insider Risk Investigations Report stresses that bolstering insider risk programmes alone is insufficient in the face of evolving threats, says John Mc Loughlin, CEO of J2 Software.

2:10
Sybrin9 May

Sybrin named a FinCrimeTech50 company by FinTech Global

The FinCrimeTech50 list highlights the trailblazers in the anti-financial crime landscape, says FinTech Global.

3:00

Strategix Technology Solutions achieves PCI DSS compliance

Companies that have their PCI DSS AOC keep pace with the rate of regulatory change while fortifying themselves against the equally rapid changes occurring in the cyber crime landscape.

3:20
NEC XON8 May

Cyber armour for a healthcare industry under attack

Sharing knowledge and lessons learned from past breaches is vital for proactive threat anticipation and containment, says Armand Kruger, head of cyber security, NEC XON.

5:20
CASA8 May

Embarking on a Zero Trust journey

If feeling overwhelmed at the scope of the Zero Trust architecture, get the basics out of the way first. Here’s how.

4:50

Orange Cyberdefense reveals vulnerabilities in credit card machines and electronic access control devices

The company revealed some of the latest research coming out of the SensePost team at its Security in Dialogue client event.

2:30

Public works minister orders probe of ‘vulnerable’ IT systems

The Department of Public Works and Infrastructure minister enlists law enforcement agencies and cyber security experts to investigate.

3:20

2024 CrowdStrike Global Threat Report: From breakout to breach in under three minutes

The report indicates adversaries seek to disrupt global elections and exploit generative AI technology.

5:30
IOCO6 May

Fighting AI with AI

With the rise of AI helping cyber criminals orchestrate attacks more effectively, security has turned into an AI-driven arms race, says Callan Abrahams, principal AI consultant at iOCO.

1:50

Dell Technologies, CrowdStrike expand partnership

The companies will deliver Dell’s Managed Detection and Response services with the AI-native CrowdStrike Falcon XDR platform.