The importance of using 'next-generation' security

An effective IT security ecosystem involves the consolidation of tools, intelligence and cloud-based analytics to protect the network by predicting threats. [Local rep: Networks Unlimited Africa]


Are your printers vulnerable to a cyber attack?

Hackers target printers to gain access to your network, says Riaan Jansen van Rensburg, Solution & Project Specialist at Green Office.


Dimension Data's executive team to lead the Middle East and African Region

Dimension Data's newly appointed executive leadership team reorganises for growth.


Hackers target SMEs too

This is because SMEs are generally ill-informed about the risks out there, and often don’t have adequate cybersecurity practices in their business.

Apr 30, 2019

How predictive threat intelligence is changing cyber security

Securing a digital business in a changing threat landscape can be challenging, fortunately, Mark Thomas, Group CTO Cyber security at Dimension Data, and TK Keanini, Distinguished Engineer, Product Line CTO for Analytics at Cisco give a few practical tips.

Mar 4, 2019

ISACA's State of Cybersecurity 2019 Survey: Retaining Qualified Cybersecurity Professionals Increasingly Challenging for Organizations

Organizations are struggling to keep their cybersecurity workforce fully staffed as competitors increasingly pick off employees who are enticed by higher pay and bonuses, according to ISACA's new cybersecurity workforce research.

Nov 7, 2018

eBook: Technology trends in 2019: Keeping an eye on the future of the digital world

Get ready for the technology trends that will reshape your business in 2019


Microsoft make cybercriminals see red

Businesses in the Middle East and Africa are key targets for cyber attackers, says Microsoft.


How the behaviours of people affect cybersecurity

Forcepoint research shows understanding people's behaviours and intent critical to future of cybersecurity - but significant gaps exist.

Oct 6, 2004

ITU seeks cybersecurity standards

The ITU is intensifying its work on standards for securing mobile and wireless networks from cyber attacks, following a cybersecurity conference.

Oct 3, 2002

US govt releases list of top security holes

The US government has released a list of the 20 biggest cybersecurity holes in a bid to plug its leaky computer systems.

Sep 20, 2002

US unveils cybersecurity report

US officials have unveiled a draft report on making the country`s cyberspace safe from attack, warning that rogue nations are already preparing for attacks that could cripple vital computer-run infrastructure. The report has drawn immediate criticism.

Related topics