Future proof IT environments with intelligent data management solutions
In today's data-driven economy, technology is front and centre, with data being an organisation's most critical asset, giving it a competitive edge if used, harnessed, and leveraged properly. By Kate Mollett, senior regional director at Commvault, Africa South &...
BDO partners with Terranova Security
BDO Advisory Services SA has announced its partnership with Terranova Security, which provides cybersecurity awareness training and phishing simulation. Each year companies spend millions of dollars or rands protecting their IT and network infra-structure. But,...
Liquid Networks launches DDoS Secure
Liquid Networks has announced the launch of its Distributed Denial of Service (DDoS) Secure offering to its customers. The solution is designed to proactively mitigate attacks by scrubbing traffic and blocking known attackers or malicious traffic. "Cyber attacks are...
Can you afford a BEC? We think not …
The first and favourite means of attack from cyber criminals is via email. Yearly they generate $26-billion from spoofing and phishing attacks, a large portion of the cybercrime industry. This is due to 80% of organisations still being vulnerable to these sorts of...
How to keep a hybrid work environment safe
Hybrid work environments have become an integral element for businesses in South Africa and across the world, notably with travel restrictions being eased and more employees getting comfortable with travel and remote working. This has also introduced ever-rising...
Intel chooses Check Point for Pathfinder for RISC-V platform
Check Point Software Technologies has announced a new collaboration with Intel. Check Point's Quantum IoT Protec will be made available within Intel's new platform for IoT device developers - Intel Pathfinder for RISC-V. Traditionally, cybersecurity has been an...
Kaspersky and Microsoft partner to deliver threat intelligence to Microsoft Sentinel users
Kaspersky Threat Data Feeds are now integrated with Microsoft Sentinel, a cloud native SIEM and SOAR solution to help Microsoft Sentinel users with actionable context for attack investigation and response. With this integration, enterprise security teams can extend...
Tips for surfing the internet safely
Today (23 August) is Internet User's Day, a day that commemorates the anniversary of one of the greatest technological events of humanity: the day in 1991 when a web page was published for the first time worldwide. From that moment on, the internet has continued to...
A zero trust model needed to protect the future workplace
Though remote work and the hybrid working model have proven beneficial for employee well-being, inclusion and productivity, there have also been pitfalls - most notably on the security front. "Threat actors never stopped looking for new ways to exploit the...
Cybereason launches MDR mobile app
Cybereason has launched the Cybereason Managed Detection and Response (MDR) Mobile App that allows Defenders the power of a security operations centre (SOC) at their fingertips. With the Cybereason MDR Mobile App, Defenders can further reduce the mean-time-to...
SA SMEs are open to cyberattacks
South African small businesses are particularly vulnerable to cyberattacks, writes Steve Flynn, sales and marketing director of ESET South Africa. This is because business owners aren't taking the necessary precautions to protect their digital assets, often with dire...
Are you getting value from your security investments?
If you have a hammer, every problem looks like a nail. Cybersecurity has a similar issue: every problem can appear as an isolated situation requiring a point solution. Yet this approach devalues cybersecurity investments considerably and leaves a lot of money on the...