Speaking engagements (1)
ITWeb Security Summit 2020
Topic: Security synergy – bringing together EDR and NTA
Articles
The Web 2.0 model can help fight cyber-crime through malicious code sharing.
Creators of malicious code are not necessarily good programmers.
Spammers target several layers of Maslow's Hierarchy of Needs and could soon abuse the highest level - self-actualisation.
As the Web advances at an incredible rate, malware techniques become significantly more sophisticated.
PCs that appear to be functioning normally may be lulling users into a false sense of security.
Companies are increasingly concerned about the costs of virus attacks, with a recent study showing many have cause for alarm.
There are similarities between the services offered by water companies and those provided by ISPs.
The increase in cyber-crime profits has led criminals into an aggressive recruitment drive for mules on the Internet.
Articles About Jeremy Matthews (12)
His appointment comes after former CEO and IT industry veteran, Jeremy Matthews, passed away in September following a brief illness.
Previously called Panda Security Africa, Dolos has been appointed as WatchGuard’s master distributor for Africa and will offer its entire portfolio of solutions.
This means the company will cease operations as a local Panda entity and become a security focused distributor.