Development doesn’t stop with #SS19Hack for young geeks
#SS19Hack participants are receiving further mentoring and support, says Geekulcha’s Nghonyama.
EDR, EPP convergence to strengthen neglected endpoint
Traditional antivirus alone is not enough as endpoint remains most vulnerable part of ICT infrastructure.
The state of SA’s IT security, according to ITWeb/VMware CISO survey
How are South African corporates dealing with the increasing challenges of cyber security? ITWeb’s annual survey, sponsored by VMware, provides some answers.
Businesses have the home field advantage over attackers
We should know our assets better than our adversaries, says Carbon Black.
Effective end-to-end security framework
Companies must have all the relevant frameworks in place to protect what is critical for every firm nowadays: its data, says Brett Skinner, security sales manager for Micro Focus.
Supply chain security: what could possibly go wrong?
You must who in your supply chain is connected to your network, says Telkom’s Steve Jump.
IOT devices are attacked within five minutes of being connected
Netscout warns that more entrants in the IOT space facilitate worm-like propagation of malware and pose significant DDOS threat.
Why you need a CASB
Cloud Access Security Brokers help implement enterprise security policies in the cloud, says Forcepoint.
Minimising reputational damage after a breach
Badly-handled communications can worsen the situation for an organisation that has fallen victim to a cyber attack, says Brunswick’s Marina Bidoli.
Winners of #SS19Hack announced
Three teams of young coders and an overall individual winner were awarded for their solutions to “secure the future citizen”.
Battle lines drawn in coming cyber war
What’s the worst that can happen in a cyber attack? Plenty, says Pukhraj Singh.
Even your bot needs to have a manageable identity
Identity governance platforms will need to evolve to identify and manage not only humans, but the non-human elements in our systems.