6.7K exposed in Garmin SA hack, regulator seeks answers

The Information Regulator will take the GPS and fitness accessory maker to task over a data breach that affected thousands of users.


NU, Indegy discuss threats to industrial control systems

Indegy solutions are now available in SA and throughout Africa through distributor Networks Unlimited Africa.


Garmin SA hacked, exposing users’ credit card details

The GPS and fitness accessory maker reveals theft of customer data from orders placed through its Web site.


Phishers eye MacOS devices

Phishing schemes mimic the iCloud service interface to steal credentials to Apple ID accounts.


Safeguard endpoint security for remote working

Endpoint security ensures employees follow the right security protocols and all devices are running on updated systems and programs, says Stefan van de Giessen, GM: Cybersecurity at Networks Unlimited Africa.


eBook: Active Directory secures companies

Irrespective of the industry or the domain, AD works the same and is driven by permissions.


Panda Security presents EDR and beyond at Gartner IT Symposium/Xpo 2019

In addition to its extensible model, Panda will launch its enterprise-focused brand, Cytomic, aimed at maximising threat prevention and stopping cyber attacks, says Jeremy Matthews, regional manager of Panda Security.


Puleng Insights: Breakthrough report released

The Breakthrough report attempts to provide guidelines for CISOs to break through some of the internal barriers to cyber security awareness and adoption.


Users still the weakest link in IT security

Most employees in the average corporate can work on the move, using their devices and processing company data from wherever they are, says Michael Morton, solutions architect at Securicom.


Safeguard your business against cyber threats's offering includes anti-virus programs and its domain validated SSL certificate, Certum DV SSL, is now available.


The impact of sextortion

Sextortion is an ever-growing crime that extends beyond Web sites and apps to various tech platforms, leaving victims severely traumatised, says John Mc Loughlin, security expert and CEO of J2 Software.