Total 49 Posts

How to teach children about cybersecurity

Password education should be age appropriate and these best practice principles should help adults to teach the principles to children in an age-appropriate way.

Building a secure African digital ecosystem

World Cyber Security Summit - Africa succeeded in bringing in fresh narratives, innovative ideas and awareness on key areas such as cyber threat intelligence, data governance, data privacy and cyber regulations in the African region.

The problem with cheap Android smartphones

African governments need to regulate which smartphone manufacturers can sell devices. The unknown brands of mobile phones pose the highest risks as far as preloaded malware and bloatware is concerned. They also don't have spare parts readily available.

How Let’s Encrypt changed the Web

Before 2016, only 40% of internet traffic was running on a secure protocol. Today, that percentage has risen from 40% to over 80%. This is all thanks to Let's Encrypt.

Everything you need to know about the Experian Data Breach

In this episode of the Tech Legal Matters podcast, we take you through everything you need to know about the Experian Data Breach. What their CEO, Ferdie Pieterse has shockingly said, what the banks are saying, and a social engineering incident that led to a 77-year-old woman losing over R100,000.

World Cyber Security Summit 2020 - Africa edition

On 28 August 2020, Trescon’s World Cyber Security Summit Africa will unearth cyber intelligence strategies, critical investment opportunities, and threats in the African cybersecurity ecosystem from leading voices in cybersecurity.

Twitter hack exposes a broader threat to democracy

Twitter mediates so much in the public sphere that weak points at the company are weak points in society. Outsiders were able to take over Twitter accounts of high-profile individuals by β€˜social engineering,’ which allowed them to convince Twitter employees to provide access to its systems.