BUSINESS TECHNOLOGY MEDIA COMPANY
Companies
Sectors
Access Control
4:50
7 hours ago

NetOps and SecOps need each other, now more than ever

In seamlessly working together, SecOps and NetOps can create a larger safety net for the entire organisation, says BUI.

1:30
7 hours ago

Whitepaper: Detecting and stopping ransomware attacks with AI

Examining how aiSIEM/aiXDR detects and stops ransomware and other types of malware associated with ransomware attacks.

4:00
Yesterday

How is your data protected and processed in the EVDS?

The ramifications of a data breach around the Electronic Vaccine Delivery System would be considerable, says Gareth de Laporte, channel and alliances manager at Micro Focus.

2:20

Tarsus On Demand signs distribution deal with ESET

Tarsus On Demand signs a managed service provider distribution agreement with Internet security company ESET.

4:30

Marsh on what the DarkSide ransomware attack means for companies

The DarkSide attack demonstrates how impactful malicious cyber attacks can be, says Marsh Africa CEO Spiros Fatouros.

4:10
Monday

Redstor adds AI, analytics to smart data management service

Now offers support for OneNote, Kubernetes and Salesforce following major updates delivered in H1.

3:50

Performanta looks to ‘tidy up’ SA’s cyber security estates

The firm believes it can tap into the managed services market with a focus on SMEs, setting its sights on expanding to lucrative markets such as the US.

5:30
Friday

Shoring up defences amid increasing data exposure threats

While vigilance remains everyone’s responsibility, the CSO’s role is continually expanding to incorporate a deeper understanding of the human psyche.

4:30

Protecting endpoints (and users) that have left the office

Protecting cloud services, cloud access, remote endpoints and data in transit is as important as safeguarding network perimeters, says ThycoticCentrify's Joseph Carson.

3:40

New Cybereason ransomware study reveals true cost to business

Of the UK firms that opted to pay a ransom demand to regain access to their encrypted systems, 43% reported that some or all of the data was corrupted during the recovery process.

5:40
Thursday

South Africans lose ‘billions’ in Africrypt crypto scam

Two Durban brothers, aged 17 and 20, “vanish” with funds after claiming their crypto trading platform had been hacked.

5:00

Micro-segmentation quo vadis?

Every risk is a digital risk; this will no longer exist in isolation within IT or within departments, says Blue Turtle Technologies.