The telco confirms the data compromised in the recent cyber security incident has been unlawfully disclosed by RansomHouse.
The Commvault Recovery Range, powered by SimSpace, integrates realistic attack simulations with essential cyber recovery exercises.
Domain Transfer Lock blocks unauthorised transfer attempts and protects against domain hijacking.
Outsourcing security to a managed detection and response service gives companies immediate access to a specialised team of professionals.
Integration gives customers advanced threat intelligence, comprehensive incident response and recovery capabilities to safeguard critical data against cyber threats.
The Financial Intelligence Centre warns that the country’s crypto sector carries a high inherent risk for the growing community of crypto users and businesses.
The data privacy law enforcer launches an online portal for reporting data breaches, moving away from e-mailed reports.
The sector is considered fair game by cyber criminals who continue to attack SA’s already stretched healthcare capability.
HPE Aruba Networking’s AI-powered NDR and campus-based ZTNA solutions are available in SA.
With the rise of automated attack tools, low-cost phishing kits and 'spray and pray' tactics, SMEs have become prime targets for cyber criminals.
Vishing uses voice calls or voicemails to create a sense of urgency and pressure you into acting quickly, says John Mc Loughlin, CEO of J2 Software.
This paper explores the updated NIST CSF Framework and discusses places where Veeam Software can assist with implementing this framework.