Cisco has released the latest in its annual cybersecurity study, Security Outcomes Report, Volume 3: Achieving Security Resilience. Consisting of survey responses from over 4,700 participants across 26 countries, the report identifies the top seven success factors that boost enterprise security resilience from the bottom to the top 10...
Ransomware remains one of the top cyber threats facing businesses in South Africa and the world, causing financial, reputational and collateral damage. In addition, there is a growing trend toward cyber extortion, where data encrypted for ransomware purposes is then leaked to the public, or even used against individuals....
In recent years, retailers have been forced to be more agile, responding rapidly to quickly changing business landscapes and consumer expectations. Retailers rushed to bring curbside and home delivery services to market and send their knowledge workers from the headquarters and contact center home in some hybrid capacity. Security...
Information security is a critical concern for all organizations, as the protection of sensitive data and systems is vital to the success and survival of any business. Obtaining information security certification can provide numerous benefits to an organization, helping to improve the effectiveness of its security program, increase compliance...
Leading cybersecurity specialist Obscure Technologies today announced the company's partnership with Pentera, the leader in automated security validation. Obscure Technologies is comprised of cyber security experts specialising in brokering best-of-breed security solutions in the African market. Fielding one of the most highly skilled and certified cyber security teams in South...
With big tech now actively advocating for a more online world, driven by a fourth industrial revolution, the Internet of Things and the Metaverse, the average individual has never before had so much of their lives on the Internet – and with this comes the need to secure organisational...
If Check Point Software’s Cybersecurity Predictions for 2023 are anything to go by, then next year will see even more global cyberattacks, government regulation, and consolidation of security solutions take place than we have ever seen. With hacking and deepfake cyberattacks on the rise, it has become imperative for...
Information security certification is a way to validate an individual’s knowledge and skills in the area of information security. It is an important way to demonstrate one’s commitment to information security and its principles. It is also a way for employers to validate that their employees have the necessary...
IT and information security are critical, but when you have multiple systems throwing out hundreds of alerts every day, it is easy to become ‘alert fatigued’. Alerts relating to real, business threats can easily be lost in the sheer volume, giving malicious attacks a gap and making your business...
Africa faces a significant challenge when it comes to the availability and distribution of cybersecurity talents and secure IT infrastructures. This is important because as the continent continues to undergo digital transformation, the need for security becomes more apparent. We have seen too many enterprises globally suffer from attacks...
Working in cyber security can be draining. It's a high-pressure environment and the stakes are only getting higher. A recent report found that 45% of cybersecurity professionals have considered quitting over the constant threat of Ransomware attacks. The industry has been evangelising (or fear-mongering, depending on who you ask) on...
With the dramatic increase in cloud adoption, organizations are relying more on cloud technology than ever before. To safely embrace this shift from traditional services to the cloud, it is imperative to take necessary measures that can improve the security infrastructure of the cloud environment. With the latest advancements...
Liquid C2, a business of Cassava Technologies, a pan-African technology group, opened the doors of its first Cyber Security Fusion Centre (CSFC) in Nairobi, Kenya, making this the second centre of its kind in Africa. "Kenyan businesses have seen increased digital adoption, and the country's connected population in early 2021...
Trellix, the cybersecurity company delivering the future of extended detection and response (XDR), today released The Threat Report: November 2022 from its Advanced Research Center, home to the world’s most elite security researchers and intelligence experts. The latest report analyzes cybersecurity trends from the third quarter of 2022. “Interestingly, the...
Before the advent of Industrial Internet of Things (IIoT), Operation Technology (OT) was safeguarded against most cyberattacks.  OT systems’ propriety nature, standards and hard-wired connectivity protected it against malicious attacks. Cyber threats and incidents are a major operating and business risk for every digital enterprise. In age the of digitisation,...
Cyber-security education, through the use of anti-phishing training programs, is vital in a world where humans remain the weakest link in the cyber-security chain. Cyber-security is a term on every businessperson’s mind, as the legal, financial and reputational implications of a breach are massive. The challenge is that, while a...
22,877FollowersFollow

Recent Posts