Magazine Button

Analysis

Attivo Networks showcases deception technology at GITEX

Attivo Networks, an award-winning leader in deception for cybersecurity threat detection, is joining Crestan International, a leading value added distributor, […]

Kaspersky Lab expert on de-risking Digital Transformation

Every business and organisation, whether small or large, is likely going through a Digital Transformation process. But this move to […]

Securing credit card transactional data is crucial, says Xperien expert

Ever wondered where every credit card transaction is recorded and stored and how secure that data is, especially after the […]

Fortinet Director on cyber hygiene practices that can go a long way

Doros Hadjizenonos, Regional Sales Director at Fortinet in South Africa, provides the cyber hygiene practices that organisations can adopt to […]

ESET researchers discover first UEFI rootkit detected in cyberattack

ESET researchers have discovered a cyberattack that used a UEFI rootkit to establish a presence on the victims’ computers. Dubbed […]

Industry experts comment on Facebook security breach

Industry experts have commented on a Facebook security breach which affected up to 50 million accounts. The social media giant […]

Westcon-Comstor expert on how to prepare for Blockchain technology

How can organisations investing in Blockchain solutions prepare their security team for the impact of the technology? By Andrew Potgieter, Director […]

J2 Software offers enterprise-grade security for SMEs in South Africa

Rising levels of cybercrime, and its increasing sophistication, threaten businesses of all sizes but SMEs are particularly vulnerable, according to […]

Fortinet expert on how security teams can prepare for Blockchain technology

How can organisations investing in Blockchain solutions prepare their security team for the impact of the technology? By Doros Hadjizenonos, […]

Syrex expert on the importance of thinking differently about cybersecurity

With data being likened to the oil of the digital age, decision-makers cannot afford to ignore evolving cyberthreats especially given […]

Browse our latest issue

Magazine Cover

View Magazine Archive