Magazine Button


Forcepoint expert on resolving disruptions in the financial industry

Gregg Brans, from Forcepoint SA, looks as how to resolve potential disruptions in the financial industry.  In the current digital […]

Industry experts discuss how best to secure a remote workforce

The modern workforce is more flexible and dynamic than ever before, with technology enabling employees to work from anywhere, at […]

Security spend and priorities – is your business getting it right?

Bernice Binet, F5 Brand Executive at South African based IT service management company EOH, analyses why organisations spend 90% of […]

Old IoT vulnerabilities: A botnet gift that ‘keeps on giving’

Bryan Hamman, Territory Manager for Sub-Saharan Africa at NETSCOUT Arbor, warns that it’s not only obvious IoT devices like fitness wearables […]

DR and security strategies could save your network, says Routed MD

Andrew Cruise, Managing Director, Routed, South Africa’s only vendor neutral cloud infrastructure provider, says that disaster recovery (DR) and back-up […]

Akamai director on how to prevent rise in cryptocurrency mining attacks

Opinion piece from Richard Meeus, Security Technology and Strategy Director at Akamai Coin-mining malware isn’t a new threat. Although it has […]

Fortinet SA expert looks at the financial cybercrime trends for 2019

Doros Hadjizenonos, Regional Sales Director for Fortinet in South Africa, looks at the cybercrime trends in the financial services industry. […]

IDC expert on how to prevent the rise in cryptocurrency mining attacks

By Kieran Frost, Research Manager, IDC South Africa Cryptomining attacks (commonly known as ‘cryptojacking’) are the among the most prevalent […]

Get to Know Your Customer Day – seven business-critical outcomes

Observed annually on the third Thursday of every quarter, ‘Get to Know Your Customer Day’ reminds businesses, large and small, […]

Using ROSI to evaluate cybersecurity technologies

Being able to demonstrate ROI on security investments to the board is one of the tasks every CISO encounters. And […]

Browse our latest issue

Magazine Cover

View Magazine Archive