BUSINESS TECHNOLOGY MEDIA COMPANY
Companies
Sectors
Security
2:10
11 hours ago

Trend Micro creates honeypot, traps malicious attackers

The six-month investigation revealed that unsecured industrial environments are primarily victims of common threats.

4:00

Data-driven video surveillance

A smart and interactive surveillance system can help to proactively monitor and prevent a hijacking and other crimes from taking place, says Sasha Bonheim, marketing manager at Axis Communications SA.

4:10

Block threats before they target your business

With threats becoming more sophisticated, enterprises are forced to look at new ways to protect themselves against evasive attacks, says Adeshni Rohit, business unit manager for Cisco at Axiz

3:40
Yesterday

Criminals hijack 70K women’s photos from Tinder

Over 70 000 photos of dating platform Tinder users are being shared by members of an online cyber crime forum.

3:10

Impression joins GlobalSign’s partner programme

Impression Signatures offers a range of GlobalSign PKI solutions to address the IT security and identity needs of regional customers in SA.

1:30

Acronis Cyber Cloud 8.0 now available

Enhancements include full-spectrum cyber protection, edition-based feature management and licensing for easier upsell, and a new Disaster Recovery section in the management console, says Peter French, managing director of Synapsys.

2:40

Using data protection to enrich SaaS strategies

Danie Marais of Redstor will discuss the link between data protection and SaaS strategy at the upcoming #ITWebCloudDD.

5:00

2020 brings even more cyber security challenges

Adding to the complexity of the ever-widening attack surface is the increasing reliance on cloud computing and the IOT, says Indi Siriniwasa, VP at Trend Micro Sub-Saharan Africa.

2:40

Scammers exploit data leak fears

Kaspersky warns of a new fraud scheme designed to fool people into thinking they are owed compensation for personal data leaks.

4:40
Thursday

17 years later, POPI Act delays continue

Although South Africans’ personal data is increasingly being exposed, there is still no commencement date for the much-anticipated law.

6:30

Security is not a single product solution

Companies should implement a next-generation security solution that includes various complementary products, says Stefan van de Giessen, GM: Cybersecurity at Networks Unlimited Africa.