BUSINESS TECHNOLOGY MEDIA COMPANY
Companies
Sectors
MJ Strydom
4:40
Jun 8, 2020

COVID-19 cyber threats spread like a virus

Advanced persistent threat groups are using the pandemic as part of their cyber operations, often masquerading as trusted entities.

4:40
Apr 1, 2020

Best practices for multi-cloud security

CIOs increasingly face the challenge of developing an effective strategy to understand and manage the mix of cloud resources upon which their businesses depend.

4:30
Mar 25, 2020

Back to the future: The 2020 cyber-threat reality

Examining the reality of today’s cyber security landscape, and the concerning trends that came out of 2019 and how they can be best addressed.

5:50
Jan 23, 2020

Surviving a deepfake world

Numerous capabilities in the public domain deliver deepfake audio and video abilities to hundreds of thousands of cyber criminals.

4:30
Dec 4, 2019

Easing the mobile threat defence headache

Why mobile threat defence solutions are now an essential component of cyber security strategies.

4:40
Oct 24, 2019

Mobile under attack with malicious intent

Today’s cyber criminals are highly motivated and equipped to launch a wide range of attacks on our personal devices.

4:50
Oct 17, 2019

Cyber security 2019: It’s not all bad news so far

Reflecting on the 2019 cyber security landscape and what the overall picture is looking like for this year.

4:40
Aug 15, 2019

The balancing act of cloud versus risk

Why companies should still consider using cloud services even when they bring such high risk with them.

4:20
May 7, 2019

CEOs must become 'chief trust officers'

Cyber security responsibility must rest on the head of the leader at the highest level.

5:00
Mar 28, 2019

Artificial intelligence creates 'self-learning attackers'

Companies should look past the myths and hype of artificial intelligence to discover its real potential, for good and bad.

5:00
Feb 20, 2019

2019 cyber security: More of the same or worse?

If growth of attack techniques continues into 2019 through hits on automated tech, the best years of system security may well be behind us.

3:30

Why hire people to breach your network?

Cyber criminals will always go for the low-hanging fruit, so businesses should strive to make themselves a less attractive target than the next business, says DRS.

Related topics