BUSINESS TECHNOLOGY MEDIA COMPANY
Companies
Sectors
Security
4:20

Is your business too ‘trusting’?

Businesses must assume that no user or device can be trusted and must always be verified when accessing the network, says Lukas van der Merwe, specialist sales executive: Security at T-Systems South Africa.

6:30
8 hours ago

The reliability of mobile credentials

It has become essential to have an access control solution that works for your environment and meets your needs, says Powell Tronics.

3:10
10 hours ago

Panda Security offers free cyber-risk assessments as it launches Webinar series on building cyber-resilience

In the new series, Panda will explore how EDR technologies can provide an additional layer of protection as part of a holistic cybersecurity strategy.

7:40

Data privacy can mean jail time for CEOs

While POPIA is imminent, the extent of its efficacy is still unclear.

4:10
Yesterday

Cyberspace, skills conundrum top threats for CEOs

PwC’s latest survey reveals the threats giving CEOs sleepless nights, indicating CEO pessimism over global growth at a record high.

2:50
Yesterday

Focusing on cyber security in 2020

Cyber security must remain the cornerstone of any organisational strategy to ensure data remains protected, says Ralph Berndt, director of sales at Syrex.

4:00
Yesterday

Microsoft exposes 250m customer records

The records contain logs of conversations between Microsoft support agents and customers from all over the world.

2:00

Major card issuers opt to secure e-commerce payments with Entersekt and Netcetera

Entersekt and Netcetera deliver a PSD2-compliant, highly secure online payment process that's user-friendly and reduces card-not-present fraud significantly.

5:50
Yesterday

Surviving a deepfake world

Numerous capabilities in the public domain deliver deepfake audio and video abilities to hundreds of thousands of cyber criminals.

2:10
Wednesday

Datacentrix, Cybereason change security game

Datacentrix has joined Game Changers, the newest partner tier announced recently by Cybereason.

2:10
Wednesday

Trend Micro creates honeypot, traps malicious attackers

The six-month investigation revealed that unsecured industrial environments are primarily victims of common threats.

4:00

Data-driven video surveillance

A smart and interactive surveillance system can help to proactively monitor and prevent a hijacking and other crimes from taking place, says Sasha Bonheim, marketing manager at Axis Communications SA.