While telcos and ISPs may not handle money directly, they carry something just as valuable: data, says Anthony Laing, GM of networking at NEC XON.
International collaboration will secure global time synchronisation infrastructure through the joint development of next-generation anti-jamming and anti-spoofing technologies.
4Sight implemented a solution that offers Process Automation real-time monitoring, 24/7.
E-mail disguised as an internal message from HR or IT is the most successful phishing tactic of 2025, according to research by KnowBe4.
South Africa joins the cyber crime fighting pact of 65 United Nations member states, amid accelerating digital harms.
Legitimate e-mails are being hijacked to send out phishing scams purporting to be court summonses.
The Department of Justice and Constitutional Development’s systems have been disrupted by a Windows 11 malfunction.
Intelligent corporate networks can continuously strengthen themselves, adapting to evolving risks in real-time, rather than waiting for breaches to occur.
The cyber security firm warns of ‘wider systemic vulnerability’ within the data-intensive education sector.
External attack surface management focuses on what the attacker sees, says Kyle Pillay, security as a service manager at Datacentrix.
Weak infrastructure leaves South African businesses vulnerable to cyber hacks, warns BDO’s latest Techtonic States Report.
The University of Witwatersrand’s confirms its IT system has been compromised due to a cyber attack.