Cybereason’s new ‘Game Changers’ partner investments are the most lucrative in the cybersecurity industry

The channel programme focuses on making strategic partners profitable in their Cybereason businesses by offering new and differentiated value-added services.

Jul 18, 2019

The importance of using 'next-generation' security

An effective IT security ecosystem involves the consolidation of tools, intelligence and cloud-based analytics to protect the network by predicting threats. [Local rep: Networks Unlimited Africa]

Jul 17, 2019

Are your printers vulnerable to a cyber attack?

Hackers target printers to gain access to your network, says Riaan Jansen van Rensburg, Solution & Project Specialist at Green Office.

Jul 12, 2019

Dimension Data's executive team to lead the Middle East and African Region

Dimension Data's newly appointed executive leadership team reorganises for growth.

Jul 12, 2019

Hackers target SMEs too

This is because SMEs are generally ill-informed about the risks out there, and often don’t have adequate cybersecurity practices in their business.

Apr 30, 2019

How predictive threat intelligence is changing cyber security

Securing a digital business in a changing threat landscape can be challenging, fortunately, Mark Thomas, Group CTO Cyber security at Dimension Data, and TK Keanini, Distinguished Engineer, Product Line CTO for Analytics at Cisco give a few practical tips.

Mar 4, 2019

ISACA's State of Cybersecurity 2019 Survey: Retaining Qualified Cybersecurity Professionals Increasingly Challenging for Organizations

Organizations are struggling to keep their cybersecurity workforce fully staffed as competitors increasingly pick off employees who are enticed by higher pay and bonuses, according to ISACA's new cybersecurity workforce research.

Nov 7, 2018

eBook: Technology trends in 2019: Keeping an eye on the future of the digital world

Get ready for the technology trends that will reshape your business in 2019


Microsoft make cybercriminals see red

Businesses in the Middle East and Africa are key targets for cyber attackers, says Microsoft.


How the behaviours of people affect cybersecurity

Forcepoint research shows understanding people's behaviours and intent critical to future of cybersecurity - but significant gaps exist.

Oct 6, 2004

ITU seeks cybersecurity standards

The ITU is intensifying its work on standards for securing mobile and wireless networks from cyber attacks, following a cybersecurity conference.

Oct 3, 2002

US govt releases list of top security holes

The US government has released a list of the 20 biggest cybersecurity holes in a bid to plug its leaky computer systems.

Related topics