Security
6:20

Protect your critical infrastructure and manufacturing plants with Indegy and NU Africa.

IIOT brings major benefits but also risks to the business, says Stefan van de Giessen, GM of cyber security at Networks Unlimited Africa.

0:40

eBook: Keep cyber threats from destroying your company

Every year, security risks are growing, and that growth isn’t going to stop.

2:50

Catching the big phish

The KHIPU team assisted UNISA in customised simulated phishing campaigns, the delivery of simulated phishing e-mails to various departments within the university, as well as training.

3:20
Friday

CASB is the answer, but are we asking the right questions?

It is boom time for the cloud access security broker market as every business that uses the cloud needs the solutions in one form or another.

4:50

Next-gen financial crime methods need next-gen crime prevention

Financial institutions are trying to prevent new risk with old, siloed technologies, says Bateleur Software.

4:30

Fujitsu, SAP team up

Fujitsu’s retail solution enabling the reduction of losses at the point of sale is now available directly from SAP as a Solution Extension.

5:10
Thursday

Improve network security with SD-WAN, Silver Peak

Silver Peak offers six ways to use a secure SD-WAN solution to improve network security and compliance, says Marcel Fouché, networking and storage GM at Networks Unlimited Africa.

2:20

SA targeted in new phishing attack

SA was among over 100 countries targeted by a Phishing actor or group using the same techniques, says Fortinet.

2:50

Reductor malware hijacks HTTPS traffic

Kaspersky has discovered new malware that hijacks victims’ interactions with HTTPS Web pages.

3:00

US blacklists Chinese tech firms over human rights abuses

As the US/China trade war rages on, the US government has extended its trade blacklist to Chinese technology companies.

1:20

Vulnerability management helps prevent breaches

Teemu Myllykangas (F-Secure) and Anthony Cowie (Cybervision) will host an interactive presentation on the benefits of vulnerability management.