BUSINESS TECHNOLOGY MEDIA COMPANY
Companies
Sectors
Access Control
4:10

How the ‘broken window’ theory affects cyber security matters

As a first step to ensure you cover all bases, ascertain whether there are any cracks in your cyber security posture – in essence, a ‘broken window’, says Stefan van de Giessen: GM: Cybersecurity at Networks Unlimited Africa.

6:50

The value of information sharing and risks of cyber shaming

It’s time to overcome the fear of admitting you’ve been hacked, says MJ Shoer, senior VP and executive director of the CompTIA ISAO.

5:20

Getting privileged remote access right for the new normal workforce

Finding the right balance between security and business agility takes time and adjustments along the way, says Andrew Silberman, senior product marketing manager at CyberArk.

1:10
Yesterday

DataGroupIT wins distribution rights to Quest

The partnership aims to strengthen Quest’s delivery model and grow its footprint across the continent.

3:00

ZACR warns of global cyber criminals targeting SA

The.za domain name administrator says increasing connectivity during lockdown comes at a cost, as more users attract the online attention of fraudsters.

3:50

Employees are your primary security risk

Exponant has unveiled its Security Risk and Compliance solution, which enables its clients to focus on productivity.

0:50

Webinar: IBM Secure Proxy

IBM Sterling Secure Proxy provides protection against external threats looming at the edge of your enterprise, on-premises or over the cloud.

3:30

Nucleus Cyber release simplifies information security in Microsoft Teams

NC Protect empowers team owners to apply security and access policies to Microsoft Teams sites and channels.

4:00

Organisations must ready for POPI Act’s full might

As companies prepare to comply with the POPI Act, they should expect to see an active Information Regulator and strict enforcement, says Deloitte’s Leishen Pillay.

3:30

Facial verification is key to ending bias in facial biometric software

iiDENTIFii examines the differences between facial verification and facial recognition.

7:10

A 2021 vision for cyber security

We can choose to use our experiences from 2020 to secure our organisations and future, or miss another opportunity to contribute to building a safer digital world.

8:30

WhatsApp’s privacy fiasco draws attention to risks of messaging apps

The backlash to WhatsApp’s terms and privacy policy changes have brought forward the privacy and cyber security conversation necessary around messaging apps, says Takalani Mavhunga, CFO at Nexio.