Trellix detects collaboration by cyber criminals, nation-states
The report highlights new programming languages in malware development, the adoption of malicious GenAI and the acceleration of geopolitical threat activity.
The alphabet soup of SASE: SWG vs CASB, FWaaS, more
Combining enterprise networking capabilities with next-generation security tools is essential when building a scalable WAN for digital transformation.
Telcos can minimise data roaming fraud with iNSight
4C Group provides business assurance services to telcos, including fraud management and AML software built around its iNSight framework.
Cyber insurance may have benefits, but it won’t get your stolen data back
With the rampant rise in ransomware incidents, the likelihood of an organisation being successfully breached is now extremely high.
Digital trust: Why SEO poisoning is on the rise
Our automatic tendency to trust what we see on our screens, says Paolo Passeri, principal sales engineer at Netskope.
NIL Data SA, ISC2 join forces
This collaboration will provide IT professionals across sub-Saharan Africa with access to cyber security learning resources and certifications.
InfoReg demands answers from TransUnion, Experian on alleged hack
The Information Regulator wants the credit bureaus to show it exactly how they came to the conclusion that they were not hacked for a second time.
How does IOT tunnelling relate to zero trust networking?
The increasing importance of IOT security has enterprises searching for the best ways – often involving zero trust principles – to establish secure connections.
Five threat predictions to note for 2024
AI and machine learning will be used in future cyber security attacks to generate realistic phishing e-mails and websites.
White paper: How to stop business e-mail compromise threats
Advanced techniques for fighting financial phishing fraud.
Trellix, Illumio offer advice on how to defeat ransomware
Trellix is partnering with Illumio on a series of Ransomware Detection and Response Workshops this December in the US.
Simulated phishing: Uncovering vulnerabilities for better cyber security
A valuable tool in the fight against the threat of phishing has been the deployment of simulated phishing and awareness training services.