Information Security



Unrecoverable encrypted data
Issue 3 2022, News & Events
Cybersecurity research indicates that 76% of organisations admit to paying ransomware criminals, however, one-third are still unable to recover data.

Read more...
Citrix App Protection helps secure remote workers
Issue 3 2022, Infrastructure
Many organisations are implementing a zero-trust security model with data protection as a top priority. This is largely due to the increase in remote work and unmanaged personal devices playing a growing role in the enterprise.

Read more...
2022 Cloud Security Report
Issue 3 2022, Infrastructure
The 2022 Cloud Security Report reveals how security executives and practitioners are using the cloud, how their organisations are responding to security threats in the cloud, and the challenges they are facing.

Read more...
Arcserve launches N Series appliances
Issue 3 2022, Infrastructure
Arcserve introduces N Series appliances offering enterprise-level integrated data protection, recovery and cybersecurity to allow customers to simplify their IT environments and secure data.

Read more...
Securing business information more important than ever
Issue 3 2022, Products & Solutions
SMBs need to operate safely within the physical and virtual boundaries created by work-from-home business practices, as well as in-office operations.

Read more...
Storage is essential for a comprehensive cybersecurity strategy
Issue 3 2022, Integrated Solutions
Cyber resilience is the ability of an enterprise to limit the impact of security incidents by deploying and arranging appropriate security tools and processes.

Read more...
Malicious file protection for mobile devices
Issue 3 2022
The new version of Check Point Harmony Mobile, a mobile threat solution, can now block the download of malicious files to mobile devices, preventing file-based cyberattacks on organisations.

Read more...
Turnkey data loss prevention solution
Issue 3 2022, Infrastructure, Products & Solutions
Acronis’s expertise in data protection and the managed service provider market yields an innovative, fast-track approach for the prevention of catastrophic data leaks.

Read more...
The cybersecurity consolidation conundrum
Issue 3 2022, Editor's Choice, Healthcare (Industry)
Check Point discusses why less is sometimes more when it comes to securing your organisation from the innumerable cyberattacks happening every day.

Read more...
Companies continue to pay multiple ransom demands
Issue 3 2022, News & Events
Study reveals that 80% of companies that paid a ransom demand were hit again, nearly 50% reported paying a second ransom and nearly 10% paid a third time.

Read more...
DCC becomes sole Symantec distributor for South Africa
Issue 3 2022, News & Events
Drive Control Corporation (DCC) has been appointed the sole distributor for Symantec security solutions to the South Africa channel, and will now also be distributing Symantec into the SADC region.

Read more...
The evolution of vulnerability management
Issue 3 2022
As organisations focus on digitally transforming their enterprises, cybersecurity professionals have been facing an expansion of their attack surface – compounded by the digital explosion during the pandemic.

Read more...
VMware enhances its lateral security for multi-cloud
Issue 3 2022, Technews Publishing
Ahead of RSA Conference 2022, VMware introduced Contexa, VMware’s full-fidelity threat intelligence capability that observes the breadth of VMware’s network, endpoint, and user technologies.

Read more...
Securing mobile devices for a remote workforce
Issue 3 2022
As a channel to your personal data, banking and accounts, and a link to your work and business data, smartphones drive cybercriminals directly to your pocket.

Read more...
XM Cyber counters attacks involving Microsoft Active Directory exploits
Issue 3 2022
XM Cyber unveils first solution to reveal entire attack paths across AD and other vectors, aiding remediation and continuously protecting critical assets.

Read more...
How to stop the costliest internet scam
Issue 3 2022
While ransomware, hacking, API hacks, and all the other cybersecurity threats make headlines, it is worth remembering that the costliest internet scam is still business email compromises.

Read more...
How the MITRE ATT&CK Framework has revolutionised cybersecurity
Issue 3 2022
The MITRE ATT&CK framework is the most widely adopted and used by industry experts; what’s more, it is free and provides businesses with a fantastic source of information to strengthen their security posture.

Read more...
Trying to catch the big phish
Issue 3 2022
Rather than focus on techniques, John Mc Loughlin, CEO of J2 discusses how phishing applications have changed to match new security standards.

Read more...
Corporations protected, but not secure
Issue 3 2022, News & Events, Security Services & Risk Management
Nearly three quarters of South Africa’s top 100 corporates are investing more in cybersecurity than the industry average, but an almost equal proportion don’t feel fully protected by their current cybersecurity strategy.

Read more...
People and processes for banking security
Issue 3 2022, Guardian Eye, Security Services & Risk Management
South Africa is the third most-targeted country worldwide when it comes to cybercrime and it is no different with the local banking sector, which needs to ensure its systems and people are ready.

Read more...



<< First   < Previous   Page 16 of 84   Next >   Last >>