Tag: Cybersecurity

1 2 3 10 / 24 POSTS
Why Should Cloud Companies Care About Blockchain?

Why Should Cloud Companies Care About Blockchain?

by Ben Dickson The struggles of the blockchain industry are, after a fashion, reminiscent of the latest storylines in HBO’s TV series Silicon V ...
Cybersecurity:  8 Steps to Protect your Business

Cybersecurity: 8 Steps to Protect your Business

by Mayleen Bywater, senior product manager, cloud security solutions, Vox The issue of information security is trending in the news again with mult ...
Digital Transformation – Is It Real or Just Science Fiction?

Digital Transformation – Is It Real or Just Science Fiction?

by George Kalebaila, research director at International Data Corporation (IDC) While digital transformation has emerged as a top priority for most ...
Cyber-security – Essential in Realising our e-Government Ambitions

Cyber-security – Essential in Realising our e-Government Ambitions

by Simeon Tassev, MD and QSA at Galix We often talk about cyber-security from the perspective of the private sector, however, governments and publi ...
Guarding against the possible Spectre in every machine

Guarding against the possible Spectre in every machine

by Scott Shackelford, Indiana University Security vulnerabilities in technology extend well beyond problems with software. Earlier this month, rese ...
BCX Manages 100,000 IIoT Devices & Sensors

BCX Manages 100,000 IIoT Devices & Sensors

Telkom technology subsidiary BCX is managing about 100,000 Industrial Internet of Things (IIoT) devices and sensors. Sipho Maseko, the CEO of Telko ...
Smart Network Security Choices Can Save You From Hacker Headaches!

Smart Network Security Choices Can Save You From Hacker Headaches!

By Brendan McAravey, Country Manager at Citrix South Africa “Open”, Wi-Fi is available almost everywhere, different cities have their own implement ...
Customer Education, Empowerment Key to Cloud-based Ebilling Security

Customer Education, Empowerment Key to Cloud-based Ebilling Security

By Stergios Saltas, MD at Striata South Africa Phishing attacks continue to exploit the most vulnerable part of a system: people. Every day, all ...
Do I Really Need A Smart Firewall In My Home?

Do I Really Need A Smart Firewall In My Home?

By T Roy, IoT Defense Inc. One of the most common questions we get from potential customers, at least from the more technically minded ones is – I ...
How Safe Is Safe Enough?

How Safe Is Safe Enough?

By Martin Walshaw, Senior engineer at F5 Networks Did you know that 56% of all data breaches in 2016 began with a user clicking on a phishing email ...
1 2 3 10 / 24 POSTS