subscribe: Daily Newsletter

 

Aiding mobile device investigations

There’s no doubt that mobile phones are ubiquitous. Out of the roughly 7-billion people who share this planet,...

posted on: Nov 7, 2017 | author: Allan Davison

FirstRand prioritises model risk mana...

FirstRand needed to gain a single view of model risk across various franchises, segments and geographies, while...

posted on: Oct 30, 2017 | author: Allan Davison

Creating effective cybercrime trainin...

Recent statistics released by Vanson Bourne and Mimecast show that less than half of South African companies are...

posted on: Oct 30, 2017 | author: Allan Davison

Strengthen your security position

The changing face of IT security is seen in such factors of modern life as the pervasiveness of the Internet, the...

posted on: Oct 26, 2017 | author: Allan Davison

Cyber insurance and availability make...

With attacks like WannaCry and Petya infecting hundreds of thousands of computers worldwide, many are calling this the...

posted on: Oct 24, 2017 | author: Allan Davison

King Price launches cyber-insurance

Most people know whether they have insurance for their stuff, car accidents and theft, and liability, but do they know...

posted on: Oct 11, 2017 | author: Allan Davison

Availability in the age of security r...

With ransomware attacks becoming increasingly prevalent, companies are more aware than ever for the need for effective...

posted on: Oct 10, 2017 | author: Allan Davison

The case for cyber insurance

South Africa has not come through recent cyber-attacks unscathed. When cyber criminals breach a network, it’s...

posted on: Sep 22, 2017 | author: Allan Davison

Tips for selling to CISOs

Selling cyber security products and services is challenging at the best of times. Security, even though it is...

posted on: Sep 21, 2017 | author: Allan Davison

BDO advises risk assessment

In a new white paper published today, BDO’s global cybersecurity leadership group stresses the importance of...

posted on: Sep 5, 2017 | author: Allan Davison

Hacking humans

The easiest way to hack into a network is by exploiting the one vulnerability most often left unpatched — human...

posted on: Sep 4, 2017 | author: Allan Davison

The risks of allowing smartphones at ...

Employees aren’t just bringing their devices into work — they’re living on them. Checking...

posted on: Sep 4, 2017 | author: Allan Davison

« Previous Entries Next Entries »