Microsoft uncovers Russian-based Midnight Blizzard is behind a phishing campaign that affected fewer than 40 global organisations.
The way you implement your PKI affects your compliance and level of trust, making it the cornerstone of a zero trust architecture.
The milestone reinforces the company's commitment to helping customers defend against the latest cyber security threats.
By implementing Netskope, companies can protect users from interacting with unknown and unmanaged SaaS applications.
Cyber criminals exploit new vulnerabilities before they can be patched, consistently outpacing the efforts of vendors, says John Mc Loughlin, CEO of J2 Software.
HYPR is proficient in providing a versatile and customisable authentication experience, says Patrick Assheton-Smith, CEO of Symbiosys IT.
Lenovo to feature CyberArk Endpoint Privilege Manager as the first identity security offering within its ThinkShield security portfolio.
Companies need to define the business problem of a possible cyber security breach, and recognise the need for multiple layers of defence.
Real-world cases of cyber attacks in SA will be examined, with valuable insights into endpoint security strategies provided.
The company has received official accredited status from the UKAS to the revised international standard for information security management, ISO/IEC 27001.
Microsoft Azure is built from the ground up, with security, compliance and privacy as foundational pillars, says Hilton Ashford, cyber security architect at BUI.