Understanding XDR in practice
The XDR detection and response approach connects the virtual dots in cybersecurity. Indi Siriniwasa, Vice President Sub-Saharan Africa at Trend Micro, tells us more. Having broader visibility into the cyber risks...
The XDR detection and response approach connects the virtual dots in cybersecurity. Indi Siriniwasa, Vice President Sub-Saharan Africa at Trend Micro, tells us more. Having broader visibility into the cyber risks...
The rapidly rising reliance on mobile phones in the workplace has facilitated an increased cybersecurity threat from malicious phone hackers that many manufacturers are not equipped to handle. Tom Davison, EMEA...
Markets across Africa are evolving, possibly more rapidly than ever before in history, and this is largely due to continuous advances in and the growing uptake of digital technology. In commemorating Africa...
The aviation sector is being increasingly digitised which, while providing numerous benefits for consumers and passengers, also introduces new risks and makes the industry a hot target for cybercriminals. Industry...
How do you identify an attacker who is supposed to be accessing sensitive data as part of their job role? Although they are notoriously difficult to identify there are, nonetheless, tell-tale signs that indicate the...
According to the results of a new survey by Securonix, the cloud not only makes enterprises vulnerable to insider attacks, it makes those attacks even more difficult to detect. In the 2019 Insider Threat Report, 39%...