5 Dec

Fraudsters don't want us to get smarter systems

The unprecedented amount of data at our fingertips today enables the smart application of integrated, collaborative, intelligent fraud hunting systems.

Nov 2, 2018

Hive-mind of apps secures cyber resiliency

Synergies will be the most important advance in corporate cyber security in our near future.

Aug 22, 2018

Shift to 'permit and control' shadow IT

IT departments are under increasing pressure to acknowledge shadow IT and go beyond merely sanctioning its use to actively supporting it.

Jul 13, 2018

Millennials don't care about security

It's time to bust the myth. Millennials do in fact care about their security and online safety but are too trusting to recognise real threats.

May 30, 2018

The 'separate forensics' ship has sailed

Why aren't businesspeople and IT people working together to help their company navigate the rough seas?

Apr 26, 2018

White paper: IBM X-Force Threat Intelligence Index 2018

The report highlights high-profile security events of 2017 and forecasts trends that will occur in 2018.

Apr 19, 2018

Am I secure in the cloud?

While most businesses know and understand the benefits of cloud, some still struggle with security.

Apr 17, 2018

Have you gone phishing?

Layered security measures must go beyond the perimeter and anti-virus to protect companies against phishing attacks.

Apr 16, 2018

White paper: Top five cyber attack categories targeting the government sector

Cyber threats targeting the government sector have become a growing concern, according to IBM X-Force Security Incident Data.

Mar 27, 2018

White paper: Is your incident response plan better than the global average?

Most companies do not have a formal cyber security incident response plan, an IBM study found.

Mar 19, 2018

White paper: The cost of data breaches in SA

The average total organisational cost of data breaches in SA was R32 million in 2017, according to an IBM Security study.

Jan 31, 2018

Why data loss prevention should be top priority

DLP solutions build extra layers of protection against data theft using deep content analysis and identification techniques.

Related topics