Cyber extortion activity was the topic of a recent ransomware and Cy-X webinar, hosted by KnowBe4 in partnership with ITWeb.
Ongoing awareness is crucial in understanding how to manage potential cyber security challenges posed by these developing tools, says Steve Flynn, sales and marketing director at ESET Southern Africa.
The company has signed a distribution agreement with BeyondTrust for the distribution of its portfolio in the Southern African Development Community region.
Biometric attacks continue to grow in volume, intensity and sophistication, says Gur Geva, founder and CEO of iiDENTIFii.
CyberArk introduces a peer-based framework for evaluating and maturing identity security strategies.
Insider abuse and data misuse account for more than a third of data breaches in financial services organisations, says John Mc Loughlin, CEO at J2 Software.
A leak of sensitive source code provides valuable information to hackers and malicious actors who may attempt to exploit vulnerabilities in the code.
Nakivo Backup & Replication prevents unauthorised security breaches, says Data Sciences Corporation.
A security breach accessed only publicly available information and it refuses to give in to cyber extortionists, it states.
The Security Posture Management Platform delivers 142% ROI and total benefits of over $3.7 million over three years, according to independent research by Forrester Consulting.
SA loses out on $570 million dollars annually when cyber security is not taken into consideration, a recent report reveals.