The future of the connected car

The driverless car revolution is closer than you might think. Martin Walshaw, Senior Systems Engineer at F5 Networks, discusses the security challenges which must be overcome in order for this future to become a reality.

Read More

Five steps to e-waste compliance

National Environmental Management: Waste Act of 2008 requires the proper disposal of hazardous materials, including electronic goods. Then, there's POPI . . .

Read More

Big data's significant implications for litigation

eDiscovery is important in all forms of litigation and dispute resolution, but the processes and technologies around it are often complex because of the sheer volume of electronic data produced and stored. Webber Wentzel's Megan Jackson explains.

Read More

Cybercrime booming in 2017

So far, cyberattacks in 2017 are occurring at a higher frequency than previous years and recent infiltrations have demonstrated the agility, scale and persistence of an attack that criminals are capable of executing.

Read More

Are you prepared as IoT threats mount?

For organisations to adequately protect themselves in the IoT era, they must move from static defence to agile responses to security threats via workflow automation and orchestration in their security operations

Read More

Security as a service as threats evolve

"Network security requires a multi-pronged approach, as modern-day networks are borderless" ~ Anton Jacobsz, managing director of Networks Unlimited

Read More

Business leaders must stand up to corruption

It is estimated that $1-trillion is paid each year in bribes globally, and that $2,6-trillion is lost to corruption. Is it time for a zero tolerance drive by business leaders?

Read More

Destruction of services attacks coming soon

Business email compromise, a social engineering attack in which an email is designed to trick organisations into transferring money to attackers, is becoming highly lucrative. But that's not all, says Cisco . . .

Read More

Now, the profitable high-tech law firm

Disbursement management and recovery software automates processes so law firms can keep track of every transaction and file accurate cost reports for every case.

Read More

Drastic mindshift needed to combat cybercrime

“It is unrealistic to expect employees to ‘think like a hacker’, as cybercriminals and their tools have become much more sophisticated over the years. Normal users cannot outsmart criminals." ~ Michiel Jonker, director: IT Advisory at Grant Thornton

Read More
Share This