#AfricaMonth

Subscribe to industry newsletters

Preparing customers for new cyber security regulations
Preparing customers for new cyber security regulations

Organisations across the board are under pressure to secure their data, and act decisively and transparently should they suffer a security event...

3 days ago

Lessons learned from the latest WhatsApp hack
Lessons learned from the latest WhatsApp hack

We were once again reminded that mobile devices, the one thing most of us never leave home without, are vulnerable to attacks...

16 May 2019

Addressing the local cybersecurity skills shortage
Addressing the local cybersecurity skills shortage

The PWC Global Economic Crime and Fraud Survey published in 2018 states that over a quarter of South African respondents believe that cybercrime will be the most disruptive, impactful crime...

By Marcus Karuppan 14 May 2019

Girls4Tech programme aims to reach one million girls by 2025
Girls4Tech programme aims to reach one million girls by 2025

First launched in South Africa in 2017, Mastercard's inquiry-based STEM programme Girls4Tech has so far reached more than 400,000 girls (ages 8-12) in 25 countries...

14 May 2019

6 Tips for creating secure passwords
6 Tips for creating secure passwords

Passwords are like toothbrushes - you want to choose a good one, never share it, and replace it quarterly...

By Doros Hadjizenonos 13 May 2019

55% of UK firms report cyber attacks
55% of UK firms report cyber attacks

Even though there is no fool-proof way to stop cybercriminals, the technology exists to recover data instantly...

10 May 2019

Cyber attacks target Operational Technology
Cyber attacks target Operational Technology

Environments running Operational technology (OT) are stepping up their focus on cybersecurity amid a growing number of attacks...

8 May 2019

Source:
Call for papers ahead of Industrial Cybersecurity Conference

Kaspersky Lab has opened its call for papers to be submitted and showcased as part of its 2019 Industrial Cybersecurity Conference...

3 May 2019

Reuben Paul aka Cyber Ninja
Teen hacks drone, warns of potential 'internet of threats'

Thirteen year old Reuben Paul, also known as 'Cyber Ninja', managed to hack into a drone during Kaspersky Lab's annual Cyber Security Weekend 2019...

30 Apr 2019

Fantastic (ethical) hackers and where to find them
Fantastic (ethical) hackers and where to find them

Data breaches and cyberattacks are unignorably on the rise and hackers are becoming increasingly sophisticated...

By Simon McCullough 26 Apr 2019

It starts with ISO 20000 and ends with easier information security compliance
It starts with ISO 20000 and ends with easier information security compliance

The looming Protection of Personal Information (PoPI) Act in South Africa and the introduction of the General Data Protection Regulation (GDPR) in the European Union (EU) have brought information security to the fore for many organisations...

By Edward Carbutt 25 Apr 2019

There's a massive cybersecurity job gap - we should fill it by employing hackers
There's a massive cybersecurity job gap - we should fill it by employing hackers

Cybersecurity incidents are gaining an increasingly high profile. In the past, these incidents may have been perceived primarily as a somewhat distant issue for organisations such as banks to deal with...

By John McAlaney and Helen Thackray 24 Apr 2019

How to protect yourself from the latest online security threat - formjacking
How to protect yourself from the latest online security threat - formjacking

The latest Symantec's Internet Security Threat Report lists formjacking as one of the most dangerous attacks in the history of cybercrime...

23 Apr 2019

Q&A: Jaya Baloo talks quantum computing, cybersecurity in financial institutions
Q&A: Jaya Baloo talks quantum computing, cybersecurity in financial institutions

Jaya Baloo has been working internationally in information security for nearly two decades...

By Evan-Lee Courie 18 Apr 2019

Attack traffic up by 32% in 2018
Attack traffic up by 32% in 2018

New research from cybersecurity provider F-Secure reports a significant increase in attack traffic in the latter half of 2018. But while attacks are increasing, it seems many companies are struggling with incident detection...

Issued by Maximizer Software 16 Apr 2019

F-Secure RADAR wins vulnerability award
F-Secure RADAR wins vulnerability award

Cybersecurity company F-Secure continues to receive market recognition for their solutions with their latest accolade being the Champion Award given for their RADAR solution by German research and analyst firm Techconsult...

Issued by Maximizer Software 16 Apr 2019

Facebook quizzes could get your identity stolen
Facebook quizzes could get your identity stolen

What kind of pizza are you? Which Disney pet are you? Which celebrity would be your perfect match?

16 Apr 2019

How autonomous IT and security solutions will enable proactive IT departments
How autonomous IT and security solutions will enable proactive IT departments

The cybersecurity of a business is still largely reliant on the people within each company's IT department...

By Pieter Engelbrecht 11 Apr 2019

Will our homes become too smart for us?
Will our homes become too smart for us?

Increased insurance risks posed by the Internet of Things...

11 Apr 2019

Phishing attacks predictions for 2019
Phishing attacks predictions for 2019

It is becoming better understood that, in order to stop phishing attacks, we need to be able to see them coming...

10 Apr 2019

Data security critical for cloud-based solutions
Data security critical for cloud-based solutions

Traditionally, data used to be a physical asset that required on-site protection. However, in the digital age, data can be located anywhere in the world...

By Stephen Garbett 9 Apr 2019

Securing the Industrial Internet of Things
Securing the Industrial Internet of Things

The very benefits that make the IIoT so compelling, makes it equally capable of damaging infrastructure operations and processes through bad actors...

8 Apr 2019

SECaaS provides a cloud-based game changer
SECaaS provides a cloud-based game changer

Security-a-a-Service (SECaaS) is not an entirely new concept...

8 Apr 2019

Why you need to be very, very aware of LoJax
Why you need to be very, very aware of LoJax

The conventional wisdom with malware is that you can kill it once and for all by wiping a system and starting from scratch, however...

By Bryan Hamman 5 Apr 2019

It's time for women to consider a career in tech
It's time for women to consider a career in tech

Before the introduction of the South African Constitution of the Republic of South Africa, women had no formal recognition as equal citizens...

By Leonie Stanley 5 Apr 2019

What 4IR means in the Namibian context
What 4IR means in the Namibian context

The world is on the verge of a major revolution; while developed countries are keeping pace with major technological advancements...

By Llewellyn le Hané 5 Apr 2019

Overcoming the 2019 cyber threat
Overcoming the 2019 cyber threat

Over the last couple of years, the dramatic development of digital technologies has fuelled the growth and needs of the mobile workforce...

By Ronald Ravel 1 Apr 2019

The growing menace of cryptocurrency exchange hacks
The growing menace of cryptocurrency exchange hacks

There are many reasons cryptocurrencies are inherently attractive to hackers. One of the biggest reasons is a lack of heavy regulation...

By Simon McCollough 29 Mar 2019

The benefits of ML and User Entity Behaviour Analytics
The benefits of ML and User Entity Behaviour Analytics

The cost of cybercrime is rapidly outpacing our ability to keep up, but can machine learning add value to cybersecurity?

By Doros Hadjizenonos 28 Mar 2019

Creating a GDPR Compliance Framework with security tech
Creating a GDPR Compliance Framework with security tech

There has been a lot of talk of GDPR over the last year, so organisations today understand the serious repercussions of non-compliance...

By Pieter Engelbrecht 26 Mar 2019

Show more