Subscribe
4:40

No trust within the network?

Strict identity verification and continuous authorisation are required for all users and devices at all times, broadening the security perimeter and boosting trust.

4:30
IDC9 May

‘Complacent’ security investment rings alarm bells

Planned investment in security slumps, due to complacency that needs to be addressed quite sharply, says IDC.

3:00

AI clears the way for amateur cyber criminals - Trend Micro

With AI, cybercrime barriers like language and coding skills are virtually broken.

2:30

Combating foreign interference

The 2024 Insider Risk Investigations Report stresses that bolstering insider risk programmes alone is insufficient in the face of evolving threats, says John Mc Loughlin, CEO of J2 Software.

2:10
Sybrin9 May

Sybrin named a FinCrimeTech50 company by FinTech Global

The FinCrimeTech50 list highlights the trailblazers in the anti-financial crime landscape, says FinTech Global.

3:00

Strategix Technology Solutions achieves PCI DSS compliance

Companies that have their PCI DSS AOC keep pace with the rate of regulatory change while fortifying themselves against the equally rapid changes occurring in the cyber crime landscape.

3:20
NEC XON8 May

Cyber armour for a healthcare industry under attack

Sharing knowledge and lessons learned from past breaches is vital for proactive threat anticipation and containment, says Armand Kruger, head of cyber security, NEC XON.

5:20
CASA8 May

Embarking on a Zero Trust journey

If feeling overwhelmed at the scope of the Zero Trust architecture, get the basics out of the way first. Here’s how.

1:30

The future of digital forensics in the spotlight at executive forum

This complimentary executive breakfast evente will be held on 15 May.

4:50

Orange Cyberdefense reveals vulnerabilities in credit card machines and electronic access control devices

The company revealed some of the latest research coming out of the SensePost team at its Security in Dialogue client event.

2:30

Public works minister orders probe of ‘vulnerable’ IT systems

The Department of Public Works and Infrastructure minister enlists law enforcement agencies and cyber security experts to investigate.

3:20

Cape Town’s crime fight takes to the skies

The city deploys aerial surveillance technology in the form of a Cessna 337 aircraft, dubbed the ‘eye-in-the-sky’.