<center><ins data-revive-zoneid="65" data-revive-id="112a9ec54d551c0833307662200d662d"></ins><!-- [et_pb_line_break_holder] --><script async src="//itomedia.co.za/www/delivery/asyncjs.php"></script></center>

So, how safe is online shopping?

With the festive season is just around the corner, Robert Brown, CEO of DRS, offers a list of tips on how to stay safe and secure when shopping online.

The future of the connected car

The driverless car revolution is closer than you might think. Martin Walshaw, Senior Systems Engineer at F5 Networks, discusses the security challenges which must be overcome in order for this future to become a reality.

Cloud Security: Ask these questions…

How would you react if someone said, “Cloud is so secure you don’t need to do anything else to protect your data?" Carey van Vlaanderen, CEO at ESET SA says questionable advice like this is becoming quite popular...

Five steps to e-waste compliance

National Environmental Management: Waste Act of 2008 requires the proper disposal of hazardous materials, including electronic goods. Then, there's POPI . . .

Big data’s significant implications for litigation

eDiscovery is important in all forms of litigation and dispute resolution, but the processes and technologies around it are often complex because of the sheer volume of electronic data produced and stored. Webber Wentzel's Megan Jackson explains.

Cybercrime booming in 2017

So far, cyberattacks in 2017 are occurring at a higher frequency than previous years and recent infiltrations have demonstrated the agility, scale and persistence of an attack that criminals are capable of executing.

Are you prepared as IoT threats mount?

For organisations to adequately protect themselves in the IoT era, they must move from static defence to agile responses to security threats via workflow automation and orchestration in their security operations

Cognitive computing improves IT security

Cybercrime timeline: In South Africa, it takes an average of 199 days to detect and contain a breach – 144 days to detect it, and often it is another company that actually detects it; then 55 days to contain it.

Security as a service as threats evolve

"Network security requires a multi-pronged approach, as modern-day networks are borderless" ~ Anton Jacobsz, managing director of Networks Unlimited

Business leaders must stand up to corruption

It is estimated that $1-trillion is paid each year in bribes globally, and that $2,6-trillion is lost to corruption. Is it time for a zero tolerance drive by business leaders?

Destruction of services attacks coming soon

Business email compromise, a social engineering attack in which an email is designed to trick organisations into transferring money to attackers, is becoming highly lucrative. But that's not all, says Cisco . . .

Update: SAP Africa signs on interim team

“SAP stands for integrity, transparency and compliance,” says Fox-Martin, who leads SAP’s business in EMEA and Greater China. “We strive to be exemplary in the manner in which we serve our customers and partners, and in how we treat our employees."

<center><ins data-revive-zoneid="61" data-revive-id="112a9ec54d551c0833307662200d662d"></ins><!-- [et_pb_line_break_holder] --><script async src="//itomedia.co.za/www/delivery/asyncjs.php"></script></center>
<center><ins data-revive-zoneid="62" data-revive-id="112a9ec54d551c0833307662200d662d"></ins><!-- [et_pb_line_break_holder] --><script async src="//itomedia.co.za/www/delivery/asyncjs.php"></script></center>
<center><ins data-revive-zoneid="63" data-revive-id="112a9ec54d551c0833307662200d662d"></ins><!-- [et_pb_line_break_holder] --><script async src="//itomedia.co.za/www/delivery/asyncjs.php"></script></center>
Share This