Subscribe
0:40

Register for the ITWeb Security Summit Johannesburg

BCX is a sponsor for this year's event, which is taking place from 4-6 June.

4:30
IMTF18 Apr

Enhancing AML compliance: Evolving risks demand heightened scrutiny, integrated data solutions

Three trends have emerged in the financial crime compliance space – sanctions circumvention, trade-based money laundering and money laundering using crypto-currency.

2:00
Commvault17 Apr

Commvault acquires Appranix

Commvault says the acquisition enables it to solve a critical cyber resilience challenge facing enterprises today – rapidly rebuilding cloud applications after an outage or attack.

2:40

SA’s trade regulator ITAC hit by cyber attack

The International Trade Administration Commission of SA becomes the latest government entity to fall victim to a cyber attack.

1:00

Endpoint security essentials for the C-suite

An executive's digital dilemma: With great tech comes greater risks.

1:30

Healthcare IT and privileged access security – an admin’s guide

The internet of medical things is the integration of interconnected medical devices, software and other services with healthcare IT systems over the internet.

2:40
Zscaler9 Apr

Zscaler, BT commercial partnership strengthens BT’s managed security services

The partnership will enable BT to offer the full suite of Zscaler’s AI-powered zero trust solutions to private and public sector customers.

2:50

Beware of deepfakes as scammers exploit AI tools

Kaspersky warns companies to be vigilant as cyber criminals use readily available tools to create deepfakes.

3:30

First Distribution empowers Kaspersky's revitalised approach to address challenges of the digital age

Kaspersky has moved away from the traditional way of targeting end-users and now looks at what consumers need out of cyber security products.

4:10

Solid8 Technologies: Trusted partner in sub-Saharan Africa's cyber security landscape

Solid8 provides a curated selection of specialised solutions across the privacy spectrum, says Riana Burgess, channel partner executive at Solid8 Technologies.

4:00

Security intelligence needs AI, machine learning-powered data protection and risk response

As attackers use AI and ML to breach networks, it is critical for data protection solutions to also use these technologies to detect breaches and mitigate risks, says Lourens Sanders, senior sales engineer at Commvault.

3:40

Digging deeper: Cyber security concerns mount in mining arena

No industry, including the mining sector, is exempt from cyber threats like phishing, ransomware, malware and financial scams, says Kyle Pillay, security operations centre manager at Datacentrix.