A zero trust model means every user and employee isn’t only authenticated when they access data or systems, they are authenticated constantly.
Implementing the right endpoint detection and response solution will help an organisation to be proactive against cyber threats instead of reactive.
Business, HR and IT subjects are increasingly being used as lure in phishing attacks, KnowBe4 finds.
According to the 2021 Data Breach Investigations Report, 85% of data breaches involve a human element such as phishing, stolen credentials or simply human error.
The Information Regulator is shocked the credit bureau’s customer data was leaked on Telegram, in a third incident where Experian’s data was compromised.
Skills shortages in IT in general and internet security specifically are critical threats to the future growth of South African businesses.
Block ransomware and improve security awareness across the company by utilising e-mail security, threat remediation and awareness training within your security ecosystem, says John Mc Loughlin, CEO at J2.
HP Wolf Essential Security embeds protection into HP printers at multiple levels, from firmware to BIOS, to help defend against cyber threats.
Part two focuses on the threat landscape, the impact of the COVID-19 pandemic on security programmes and the challenges of assessing cyber security maturity.
Global update on workforce efforts, resources and budgets.
The group that masterminded last year's SolarWinds hack still has the global IT supply chain in its crosshairs.