Subscribe
2:20

Data breaches rising at alarming rate, says InfoReg

South Africa’s Information Regulator reveals data breach notifications of as many as 150 a month, up from 56 this time last year.

7:00

Industrial control systems cyber threats and the Gulf region Part 2

It is crucial that ICS/OT cyber defenders embrace the differences between IT and ICS, says Dean Parsons, SANS certified instructor.

4:10

Hiding in plain sight – when vulnerabilities aren’t all equal

Companies must mitigate the risk where it matters most through prioritisation and continuous exposure management, says Kris Budnik, founder and director of Tilt Advisory.

3:50
Zscaler22 Feb

Zscaler introduces zero trust SASE, built on zero trust AI

Zscaler SASE solution built with Zero Trust SD-WAN eliminates security risks and complexity of traditional SD-WAN.

4:40

EXCLUSIVE: InfoReg cracks whip on pesky direct marketing calls

South Africa’s Information Regulator takes a strong stance against telemarketers, deciding that telemarketing by telephone constitutes electronic communication.

4:20

Three essentials to cyber security: People, process, technology

Critical information frequently passes through printers, whether it is printed out or scanned and sent to other recipients.

2:20

Cyber threats on the rise: Businesses urged to ramp up defences

Deepfake technology, which creates convincing fake videos, poses various risks, including tricking business users into fraudulent transactions, says John Mc Loughlin, CEO at J2 Software.

4:40
IOCO Tech16 Feb

Cyber resilience vital in threat-ridden business environment

The new cyber tech innovation era will enable organisations to rethink cyber security and respond to new threats amid breakneck global change.

5:10
Infotech16 Feb

InfoTech builds out solutions portfolio with new security stack

The new service is in line with the company’s ongoing disruptive expansion strategy, says Mauritz du Toit, CEO at InfoTech.

3:30

AI, GenAI fuel explosion of romance scams in SA

With Valentine’s Day in full swing, criminals exploit AI and GenAI to entice victims with deepfake live video chatting.

5:30

Identity at the core of zero trust: Becoming cyber secure in education

The shift to cloud-based learning platforms and hybrid education has provided a unique opportunity for the adoption of zero trust within higher education.

2:20

Data security and sovereignty: Huawei Cloud goes to great lengths to protect SA data

Huawei Cloud underpins data privacy by integrating security and privacy protection measures into cloud service life cycles, says Jay Zhou, MD of Huawei Cloud SA.