<center><ins data-revive-zoneid="29" data-revive-id="112a9ec54d551c0833307662200d662d"></ins><!-- [et_pb_line_break_holder] --><script async src="//itomedia.co.za/www/delivery/asyncjs.php"></script></center>

Cyberint puts Check Point in attack surface management lead

Check Point Software Technologies has emerged as a leading player in Attack Surface Management (ASM) with its acquisition of Cyberint, as highlighted in the recent GigaOm Radar report. Cyberint, recognised as a top performer in the Maturity/Platform Play quadrant, now...

Prevent your WhatsApp account from being hacked

A user's messaging app account might be of interest not only to jealous spouses and nosy coworkers, but also to cybercriminals. Stolen WhatsApp accounts are used for various types of criminal activity, ranging from spam distribution to sophisticated scam schemes....

Legislation tightens cyber defences for financial services

Automated processes across banking, financing, insurance and other financial services are dependent on complex infrastructures that span both on-premises data centres and cloud service providers. This dependency on third-party service providers and technology vendors...

Insights on AI-enabled cybercrime

Over the last year, discussions about AI-enabled cybercrime have shifted from speculation about impacts to real-world observations, writes Derek Manky, chief security strategist and global vice-president: threat intelligence at Fortinet. Malicious actors continue to...
<center><!-- [et_pb_line_break_holder] --><ins data-revive-zoneid="11" data-revive-id="112a9ec54d551c0833307662200d662d"></ins><!-- [et_pb_line_break_holder] --><script async src="//itomedia.co.za/www/delivery/asyncjs.php"></script><!-- [et_pb_line_break_holder] --></center>