BUSINESS TECHNOLOGY MEDIA COMPANY
Companies
Sectors
Security
5:20

Combating financial crime – COVID-19’s financial fallout

Phishing sites and phishing attacks have exploded since the outbreak of the coronavirus, says Ovations Group.

4:00

Fujitsu refreshes notebook, tablet line-up

Built-in ePrivacy filter restricts screen viewing angle – without the need for a physical filter – in LIFEBOOK U7310 model.

4:10
Tuesday

Netskope, VMware collaborate

The companies have joined forces to simplify enablement and security of remote-first workforces.

3:50

Third-party access creates huge security risks

A recent CyberArk study indicated around one in four enterprises is believed to make use of over 100 third-party vendors.

3:30

EDR necessary to prevent cyber threats

Endpoint detection and response has become a necessary addition to EPP tools in order to deal with modern cyber security threats.

2:40

Trend Micro research finds trust lacking in cyber criminal underground

The report details changing tactics and global demand for new malicious services like deepfake ransomware and AI bots.

1:40

Entersekt software optimised for Huawei Mobile Services

This integration ensures owners of new Huawei devices remain protected from digital banking fraud.

1:20

iOCO partners with Proofpoint

Proofpoint's security posture focuses on the people component of the cyber security risk framework.

3:50
Monday

AI helps automate cyber security threat detection

Aside from countering AI-based threats with equally intelligent tools, AI has become critical in managing the sheer volume of attacks, says Simeon Tassev, MD at Galix.

4:00
Friday

FNB ramps up forensic processes with crime-fighting AI

The big-four bank deploys its crime-busting artificial intelligence technology, called Manila, to combat fraud and improve risk management processes.

1:20
Friday

Striata achieves information security certification, sets itself apart from competitors

Digital communication and security specialist Striata has achieved ISO/IEC 27001:2013 certification.

3:30

Safe-Linking: Making Linux exploitation harder

Check Point has created a security mechanism to protect Linux programs from memory corruption attacks.