Dell builds ecosystem for Zero Trust adoption
Dell is bringing together more than 30 leading technology and security companies to create a unified Zero Trust solution, writes Herb Kelsey, federal chief technology officer of Dell Technologies. Navigating security is like trying to make your way through a...
Cisco solution detects cyberthreats, automates response
Cisco has unveiled the latest progress towards its vision of the Cisco Security Cloud, a unified, AI-driven, cross-domain security platform. Cisco’s new XDR solution and the release of advanced features for Duo MFA will help organizations better protect the integrity...
Forcepoint extends DLP policies from endpoints to the cloud
Forcepoint has extended the depth and breadth of its Data-first SASE (secure access service edge) offering with the launch of Forcepoint Data Security Everywhere. Forcepoint is simplifying enterprise DLP management across cloud, web and private apps and streamlining...
VMware unveils new security capabilities
VMware has announced new capabilities that deliver strong lateral security across multi-cloud environments so customers can see and stop more threats. At RSA Conference 2023, VMware unveiled enhanced features for its suite of security solutions to address the...
CA drives Symantec Enterprise Cloud in SA’s enterprise sector
CA Southern Africa, a representative of Broadcom Software, is driving the Symantec Enterprise Cloud (SEC) into the South African enterprise market. SEC is a consolidated hybrid-cloud solution offering data and threat protection backed by the worldwide network of...
Abundant scarcity: addressing the skills shortages in security
The cybersecurity workforce gap expanded by a concerning 26.2% in 2022 compared to 2021. That's around 3.4 million people needed to ensure that the security of assets is managed effectively. These statistics from the (ISC)2 2022 Cybersecurity Workforce Study are why...
In future, OT security will take an integrated approach
Operational technology (OT) cyber security, while currently lagging behind IT security and facing growing risk, is now positioned to leapfrog directly into an advanced level of cyber security maturity. This is according to Matthew Taljaard, systems engineer:...
Local platform to secure Bitcoin launches
Bitcoin is easily lost -- when a storage device is misplaced or stolen, through a scam or phishing attack or when an exchange crash wipes out your investment. BitDirect is a platform that enables Bitcoin investors to manage their cryptocurrency investments through a...
What you need to know about security during loadshedding
Everything is going fine, but then the power cuts out. No problem, your employees have laptops, and backup systems keep PCs running. But what about your data? What steps have you taken to ensure your business information and application services remain available when...
Conversational AI helps fight fraud while reducing friction for customers
The risks of identity fraud remain as high as ever for consumers and banks alike. Global research from Experian shows that 58% of consumers have been a victim of online fraud or know someone who has been a victim, or both. The challenge that banks face is protecting...
Data protection is about more than just thwarting cyberattacks
The fact that ransomware and cyberattacks have become increasingly prevalent is common knowledge, and this has raised greater awareness of the need for effective data protection. By Kate Mollett, regional director of Commvault Africa However, ransomware and other data...
Hacktivism and the new age of cyber warfare
In the most recent edition of its annual Security Report, Check Point Software Technologies looked back on a tumultuous year in cybersecurity, with the boundaries between state cyber-operations and hacktivism becoming blurred as nation states act with a degree of...