Home » IT News » Page 7

IT News

Using the Power of Tech to Shed Light on South Africa’s GBV Crisis

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit “Cookie Settings” to provide a controlled consent.

What is Good Cloud Migration Security?

Sourced from InfoWorld. Cloud adoption continues to be important for many organizations as they transform how they do business in today’s digital world. While there are many benefits associated with cloud adoption, the security implications of moving to the cloud cannot be ignored if organizations are to fully embrace it. This blog outlines the benefits of cloud migration and the security challenges associated with the process. Also, there is a list of best practices for creating a powerful cloud migration security strategy. What is Cloud Migration? Cloud migration is the process of transferring an organization’s data and apps from on-premises servers to a cloud infrastructure. Cloud infrastructure enables organizations to access data storage requirements and computing capabilities when th...

iPhone 14 Launch Event: 3 Things to Expect & How to Watch

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit “Cookie Settings” to provide a controlled consent.

South African SMEs Looked Online & Abroad for Customers During COVID, New Research Shows

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit “Cookie Settings” to provide a controlled consent.

Uber Launches a New Suite of Safety Features Across SSA

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit “Cookie Settings” to provide a controlled consent.

Liquid Networks Launches DDoS Security for African Businesses

Image sourced from Insurance Chat. Liquid Networks, a business of Cassava Technologies, a pan-African technology group, today announced the launch of its Distributed Denial of Service (DDoS) Secure offering to its customers. The solution is designed to proactively mitigate attacks by scrubbing traffic and blocking known attackers or malicious traffic. “Cyber Attacks are at an all-time high; cyber security threats cost the African GDP almost a whopping US$4.1 billion in 2021. And, DDoS are on top of the cyber security attacks; the staggering cost to our GDP is proof enough that no business can afford to be without a layer of protection against them. While DDoS attacks have evolved over the years, our offering is equally sophisticated. With traffic scrubbed at one of our four scrubbing centr...

Want to Be a Cybersecurity Expert? Kaspersky is Now Offering an Online Course

Sourced from Hypertext Developed by Kaspersky’s own cybersecurity specialists, the course aims to help businesses enhance or even build a security operations centre (SOC) from scratch – and improve SOC and security team skills in threat hunting, incident detection and investigation. The course guides the audience through the SOC structure, threat intelligence, and relevant attacks. The on-demand format and virtual hands-on labs allow training at the student’s own pace. “Enterprises need to bridge the expertise gap and increase the effectiveness of their security operations. While the question of additional investment is always sensitive, online education may be the solution to achieve their goals. Keeping in mind this business challenge, we developed a bunch of expert training courses on t...

iPhone 14: Users Fall For Scams Ahead of the Release of Apple’s New Smartphone

Apple has confirmed the long-awaited new iPhone 14 will be announced to the public on the 7th of September during its global Apple Event in September. Cybersecurity experts at Kaspersky have already found numerous examples of phishing pages, offering to buy the 14 iPhone, but actually designed to empty victims’ bank accounts and steal their Apple ID accounts. Overall, from 10 to 25 August, Kaspersky security solutions detected more than 8,700 new iPhone-related phishing sites. As the iPhone 14 announcement date gets closer, the number of phishing pages has been also increasing. For example, on August 25, Kaspersky experts detected a total of 1,023 iPhone-related phishing pages, which is almost twice the average number of such malicious site detections per day for the period. The number of ...

3 Big Cryptocurrency Misconceptions that Need to be Busted

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit “Cookie Settings” to provide a controlled consent.

How to Create a Digital Transformation Strategy that Actually Works

The working world has changed drastically. Today, survey after survey shows workers want a hybrid work model. But what does the future workplace look like and how can organisations create a digital transformation journey that fits the new paradigm? Marilyn Moodley, Country Leader for South Africa and WECA (West, East, Central Africa) at digital transformation specialist SoftwareONE, says the working landscape has changed forever. “While the idea of a digital workplace has been taking shape for several years, the start of the pandemic accelerated the trend where we witnessed over three years’ worth of digital transformation in just three months. Organisations across the globe are trying to fine-tune their hybrid work environment. Doing so often requires a faster transition to a digital work...

The Current & Future State of Smart OT Security

Image sourced from Pixabay It’s no surprise that security and network professionals working in operational technology (OT) environments are eager to take advantage of the emerging capabilities of digital transformation. Adopting modern technologies like cloud computing, machine automation, and the Internet of Things (IoT) across the industrial sector offers many potential benefits, ranging from streamlined processes that contribute to increased staff productivity to decreased plant downtime. However, a new report published by Smart Industry and sponsored by Fortinet explores the challenges these decision makers face when balancing the acceleration of their digital transformation efforts with the creation and maintenance of a strong security program. The report...

Cryptocurrency firm Luno Appoints New Country Manager for South Africa

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit “Cookie Settings” to provide a controlled consent.