Home » latest tech news » Page 22

latest tech news

Sophos Launches New Features for its Cloud Workload Protection

Image sourced from Australian Reseller News. Sophos, a global leader in next-generation cybersecurity, today unveiled new advancements to Sophos Cloud Workload Protection, including new Linux host and container security capabilities. These enhancements accelerate the detection and response of in-progress attacks and security incidents within Linux operating systems, improve security operations and bolster application performance. According to new SophosLabs research, distributed denial-of-service (DDoS) tools, cryptocurrency miners and various types of backdoors were the top three types of Linux threats detected by Sophos in a dataset from January through March 2022. DDoS tools accounted for nearly half of all Linux malware detections during this time, likely due to automate...

New Phishing Report Shows the Top Email Headlines to Beware Of

Image sourced form Broad Media. KnowBe4, provider of one of the world’s largest security awareness training and simulated phishing platforms, today announced the results of its Q1 2022 top-clicked phishing report. “In our latest quarterly phishing report, we found that holiday-themed emails were the most tempting for employees to click on,” said Stu Sjouwerman, CEO, KnowBe4. “HR-related messages such as a change in the schedule for the holidays likely piqued interest from employees to see if they would receive an extra day off or shortened work schedule due to the holidays. It is important to remember that cybercriminals utilize various tactics such as preying on people’s emotions when executing their malicious scams. Remaining vigilant and adopting a heightened sense of suspicion around e...

The 5 Most Common Security Concerns for the Web 3.0 World

Fady Younes, Cybersecurity Director for Cisco Middle East and Africa. Cisco Talos has revealed the top 5 security risks in Web 3.0. This latest iteration of the world wide web will include the immersive 3-D experience known as the “Metaverse” – a virtual reality environment where people can explore, shop, play games, spend time with friends, attend a concert, or take part in business meetings. “As the internet morphs into the metaverse a whole new range of opportunities, capabilities and features are opening up to users, institutions, governments and businesses. Despite all these possibilities, Web 3.0 is also seeing increasing security threats that can be exploited by hackers and criminals. The team of researchers at Cisco Talos has done a deep dive to highlight the most common security c...

Nutanix Appoints New CFO

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit “Cookie Settings” to provide a controlled consent.

The Importance of Training in Managing a Cybersecurity Skills Shortage

According to a report released by Ireland-based multinational professional services company Accenture, a low investment in cyber security, and immature cybercrime legislation, makes South Africa a target for cybercrime, with the country registering the third-highest number of cybercrime victims worldwide. In addition, as with other countries, the cybersecurity skills shortage is hindering the ability of businesses to effectively manage and stay ahead of constantly-evolving cyberthreats. The lack of skills means businesses find themselves on the back foot, looking for individuals who are able to manage and run solutions, manage incident and security teams, and having to ensure the  implementation of a strong security posture. This is not isolated to a single  partner or end-user o...

The Cloud Computing Skills Landscape in SA According to Standard Bank’s Yasirah Sakadavan

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit “Cookie Settings” to provide a controlled consent.

Buy the Huawei P50 Pocket & Have a Great Cell Phone

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit “Cookie Settings” to provide a controlled consent.

Huawei Nova 9 SE – The Best Cell Phone for You

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit “Cookie Settings” to provide a controlled consent.

New Huawei Programme to Upskill 100,000 People Across Sub-Saharan Africa

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit “Cookie Settings” to provide a controlled consent.

Huawei P50 – One of the Best Cell Phones to Buy

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit “Cookie Settings” to provide a controlled consent.

Kenya’s Lipa Later Scores AliExpress Co-Founder as New CTO

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit “Cookie Settings” to provide a controlled consent.

Is Safaricom the Best Company to Work for in Kenya?

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit “Cookie Settings” to provide a controlled consent.