BUSINESS TECHNOLOGY MEDIA COMPANY
Companies
Sectors
Security
3:00

Analysts predict billion-dollar surge of blockchain tech market

A new report by Future Market Insights says blockchain-based supply chain management is the primary use case in the global market.

1:10

Last call to take a quick security survey and stand a chance to win

A R5 000 online shopping voucher is up for grabs when you share how you tackle cyber security challenges.

1:50
Yesterday

Facebook admits to another damning data flaw

The company fixes a flaw that allowed third-party app developers to collect users’ personal information after authorised access to the data had expired.

1:50
Yesterday

Heficed, IPinfo.io set to improve IP address accuracy

The partnership aims to set new industry standards for IP address accuracy and improve transparency for leased IPs.

2:00

Zero-day vulnerability found on Cisco routers

CyCognito worked with Cisco to resolve the vulnerability and a patch has been released.

3:10

Poor connectivity hampers IOT deployment in mining sector

If the mining sector is to get the most out of its growing investment in IOT, there are significant challenges to overcome, says a new report.

1:50

Cyber crimes, sci-tech bills sent to president for approval

The National Council of Provinces has passed the Cybercrimes Bill and the Science and Technology Laws Amendment Bill.

1:10

Blue Label Technology Solutions teams up with Corr-Serve

BLTS has signed up with Corr-Serve as a reseller of the distributor’s IT operations and security portfolio.

4:30

Dell Technologies unpacks importance, practicalities of remote working

Dell Technologies' most recent TechByte virtual event explored the importance of technology in enabling a connected workforce.

5:10

ITWeb Security Summit 2020: Talking honeypots and Gen1 deception

Modern cyber deception has largely eliminated the operational challenges associated with legacy deception deployments.

4:40
Thursday

Stop the social engineering of customers and employees

To prevent fraud, it’s important to understand the social engineering lifecycle and how to stop manipulation of clients and staff.