BUSINESS TECHNOLOGY MEDIA COMPANY
Companies
Sectors
Access Control
0:40
an hour ago

eBook: Beyond the hype: AI in your SOC

AI can help optimise your SOC operations while successfully thwarting ever-increasing cyber threats.

4:50

Giving digital healthcare initiatives a ‘push’ in the right direction

By leveraging open standards-based API gateways – which enable the shift to push notifications – a digital healthcare experience can be delivered to patients and providers.

4:10

Guard yourself as the fight against cyber crime intensifies

On a global scale, McAfee Enterprise’s latest Advanced Threat Research Report saw a surge in publicly reported incidents in the government and entertainment sectors.

1:40

Password stealers target more South Africans in 2021

One way users can protect themselves is by using multi-factor authentication, says Kaspersky.

4:40

IT security professionals ‘secure society’ in fast-changing environment

The role of information security professionals has become critical as the world enters the second phase of the internet revolution, in which computers run everything and everything is connected.

0:40
Thursday

eBooks: The complete guide to protecting Active Directory against brute-force attacks

As AD facilitates central management by tying together servers, workstations, applications and other network components in an IT network, it's a key target for attackers.

3:20
Wednesday

Hawks, FBI bring down online romance fraud group

Local and international law enforcement authorities apprehend a syndicate with links to online romance scams that saw victims lose over R100 million.

3:50

ESET’s intelligent solutions updated for greater online protection

ESET HOME allow users to add, manage and share licences with family and friends, as well as manage Anti-Theft, Parental Control and Password Manager via the web portal.

3:00

Security and trust – foundation for better digital business

Cisco’s New Trust Standard, a benchmark for assessing an organisation’s trustworthiness, helps organisations understand the core pillars in a process that makes trust quantifiable.

7:10

Three ways to modernise your OT security

Research reveals operational technology vulnerabilities increased by 46% in 2021, necessitating a new approach to OT security.

4:20

Webinar on key data protection strategies to prevent cyber attacks

Local cyber security company Cybervision, together with F-Secure and Data Management Professionals, will host the webinar on 2 November.

4:30

Who should you trust? Absolutely nobody

Zero Trust is a key principle in the increasingly boundary-less business world, as opening up the corporate network and IT estate has profound security implications.