BUSINESS TECHNOLOGY MEDIA COMPANY
Companies
Sectors
Access Control
3:30
11 hours ago

Modernising mainframe protection in a hybrid IT world

CA Trusted Access Manager for Z helps reduce the risk of insider threats that can lead to data loss and system outages.

2:40
Thursday

Truecaller reaches 43m African users, intros business solution

The caller ID service introduces Truecaller Business Identity, to allow companies to verify their identities when making calls to customers.

0:40
Thursday

Report: 2021 State of the Phish

An in-depth look at user awareness, vulnerability and resilience.

1:50

Kalon Venture Partners infuses more capital in Sendmarc

The venture capital firm says with the ongoing cyber threats to businesses, a safer and more secure e-mail ecosystem has been forged with the security start-up.

0:40
Tuesday

Fastest route to SASE

MVISION UCE brings SASE’s important security technologies together in a cloud-native hyperscale service edge that delivers single-pass security inspection with ultra-low latency.

4:20

BankservAfrica drives SA’s digital identity creation

The group says it is creating a single digital identity that individuals own and trust, and can be used widely by banks, government and businesses.

0:50

Thycotic recognised by Gartner

The company was named a leader in the Gartner 2020 Magic Quadrant for Privileged Access Management.

3:30

Solution House Software expands Smart Cities offering with facial recognition

The focus in Smart Cities is the provision of urban management, public safety and social services in cities, councils, districts, commercial and residential estates.

1:10

Windows logon auditing: Everything you need to know in only 10 minutes [free e-book]

User logon activity needs to be audited to meet various security, operational and compliance requirements.

2:40

Netacea partners with SGT Solutions to bring bot management to Africa

SGT Solutions, formerly Saab Grintek Technologies, the telecommunications system integrator, has partnered with Netacea.

1:00
8 Apr

eBook: Six best practices for effective Linux security management

In some instances, Linux systems have been compromised and configured to distribute malware.

2:10
7 Apr

Zoom, Microsoft, Amazon most impersonated in phishing scams

The three companies were the most commonly impersonated organisations in phishing attacks in 2020, according to security firm Atlas VPN.