Latest showcases

More showcases...
Using advanced AI to stay ahead of cyber criminals
Using advanced AI to stay ahead of cyber criminals

Staying ahead of today's accelerated cybercrime trends requires adding artificial intelligence (AI) to an organisation's network security strategy...

By Doros Hadjizenonos 2 days ago

Cyber security professionals are no Darth Vader
Cyber security professionals are no Darth Vader

Cybercrime is undoubtedly a growing problem, and the costs involved are significant...

By Simeon Tassev 19 Mar 2019

Part 2: Will the so-called fourth industrial revolution propel SA forwards?
Part 2: Will the so-called fourth industrial revolution propel SA forwards?

Just what is the fourth industrial revolution? No really, what is it all about beyond the hype and jargon?

By Garth Williams 14 Mar 2019

Part 1: Will the so-called fourth industrial revolution propel SA forwards?
Part 1: Will the so-called fourth industrial revolution propel SA forwards?

Just what is the fourth industrial revolution? No really, what is it all about beyond the hype and jargon?

By Garth Williams 11 Mar 2019

Superbalist phishing scam sneakily asks for your credit card info
Superbalist phishing scam sneakily asks for your credit card info

Clothing retailer Superbalist on Monday alerted users that a new phishing scam is doing the rounds via SMS and email...

By Andy Walker 25 Feb 2019

There is more to cyber risk than security
There is more to cyber risk than security

Risk experts hold no doubts: the changes technology is bringing to businesses has far-reaching consequences. But the conversation is still split between two poles...

By Riaan Bekker 20 Feb 2019

The business of organised cybercrime
The business of organised cybercrime

Team leader, network administrator, data miner, money specialist. These are just some of the roles making a difference at today's enterprises...

By Simon McCullough 6 Feb 2019

Prepare for 2019: Weaponise Risk
Prepare for 2019: Weaponise Risk

When Noah weathered great floods, at least he had the luxury of waiting before sticking his head out of the hatch. But time is money, not only to earn some but to stay ahead...

By Riaan Bekker 6 Feb 2019

Using AI can make your business fraud-free and safer
Using AI can make your business fraud-free and safer

When it comes to AI, virtual assistants and chatbots are an immediate association for many. However, AI has other important uses for companies too - in fighting fraud...

By Rob Lith 4 Feb 2019

The security implications for 5G and IoT
The security implications for 5G and IoT

The advent of 5G networks is about much more than just incredibly fast speeds and more reliable connections...

By Doros Hadjizenonos 28 Jan 2019

How to create a cybersecurity culture
How to create a cybersecurity culture

'Cybersecurity' is still a relatively new word, making its first appearance to reference "protecting a computer or computer system" in 1989...

By Simeon Tassev 16 Jan 2019

#BizTrends2019: Digital, data-driven biometrics
#BizTrends2019: Digital, data-driven biometrics

The global biometrics market is growing rapidly. In fact, research indicates that the global market is growing a compounded growth rate of 22.9%...

By Pine Pienaar 15 Jan 2019

2019 predictions: The CIO will govern
2019 predictions: The CIO will govern

Silos - the word seemingly depicts a neat environment where things tick along or one where everything is operating in disparate chaos, the left hand clueless as to what the right hand is doing...

By Wynand Smit 14 Jan 2019

#BizTrends2019: The rise of IT acronyms
#BizTrends2019: The rise of IT acronyms

Acronyms have always dominated in the tech industry, but those that are set to rule the world in 2019 are the ones to remember...

By Rowan Fine 9 Jan 2019

#BizTrends2019: 4 Tech trends to watch for in 2019
#BizTrends2019: 4 Tech trends to watch for in 2019

It's that time of year again when everyone in the tech industry takes out their crystal balls and starts making predictions about what's going to happen in the industry in 2019...

By Esti Kilian 7 Jan 2019

#BizTrends2019: SA businesses moving closer to data-driven decision making
#BizTrends2019: SA businesses moving closer to data-driven decision making

In recent years, established South African businesses have become more aware of the importance of data and its potential role in high-level strategy...

By Brian Timperley 7 Jan 2019

Risk, security teams must collaborate
Risk, security teams must collaborate

Businesses across the board are facing an unprecedented range of cyber risks that could have catastrophic consequences...

By Jayson O’Reilly 28 Dec 2018

Are we making ourselves more vulnerable to cyber attacks in the workplace?
Are we making ourselves more vulnerable to cyber attacks in the workplace?

Some organisations still feel that by digitising their businesses, they will be exposing themselves to cyber threats...

By Brendan McAravey 14 Dec 2018

6 tips to prevent online fraud from sinking your business
6 tips to prevent online fraud from sinking your business

The success of the recent Black Friday and Cyber Monday weekend is testament to the opportunity offered by digital commerce. But local entrepreneurs should not underestimate the threat of online fraud...

By Brendon Williamson 12 Dec 2018

The burning platform for data security and compliance
The burning platform for data security and compliance

"We have connected all of our lives - personal, professional and national - to the internet. That's where the bad guys will go because that's where our lives are, our money, our secrets"...

By Gavin Meyer 5 Dec 2018

Adding threat intelligence to the security mix
Adding threat intelligence to the security mix

Today's threat landscape is so complex and fast-paced, it is impossible to prevent every threat or attack...

By Simon Campbell-Young 26 Nov 2018

Privacy vs Profit: Will 2019 be the year of consumer paranoia?
Privacy vs Profit: Will 2019 be the year of consumer paranoia?

On the surface of our tech-dependent lives, all appears to be wonderfully beneficial and benign...

By Colin Thornton 26 Nov 2018

Why privacy and security matter
Why privacy and security matter

The 2018 Data Threat Report from Thales and 451 Research found that only 13% of organisations will not be impacted by privacy regulations...

By Jayson O’Reilly 23 Nov 2018

#BlackFriday: Safe shopping starts with awareness
#BlackFriday: Safe shopping starts with awareness

One of the most common pieces of advice we get about avoiding phishing scams is that, if it seems too good to be true, it probably is...

By Brian Pinnock 22 Nov 2018

The specialised security concerns of OT networks
The specialised security concerns of OT networks

As with traditional IT networks, Operational Technology (OT) networks are undergoing a digital transformation process of their own...

By Doros Hadjizenonos 13 Nov 2018

British Airways highlights need for GDPR compliance
British Airways highlights need for GDPR compliance

Earlier this year, Liberty Life became one of the first global firms to suffer a major breach under General Data Protection Regulation (GDPR)...

By Gary Allemann 7 Nov 2018

Digital forensics is crucial to the security chain
Digital forensics is crucial to the security chain

The past decade has seen developments in technology that were previously unimagined. However, they have also become tools for cybercriminals...

By Simon Campbell-Young 6 Nov 2018

How CISOs can maintain corporate privacy
How CISOs can maintain corporate privacy

Today's workforce is increasingly comprised of millennials and other tech-savvy individuals that are accustomed to using technology in every aspect of their lives. As new technology emerges...

By Doros Hadjizenonos 6 Nov 2018

Why are CIOs and CISOs positions becoming more challenging?
Why are CIOs and CISOs positions becoming more challenging?

CIOs and CISO's across industries are regularly moving between positions and companies because of a common mistake...

By Pieter Engelbrecht 31 Oct 2018

App permissions can be used to exploit your data
App permissions can be used to exploit your data

Every time an application is installed on a device, the user is asked to allow that app certain permissions...

By Simon Campbell-Young 26 Oct 2018

Next >