play_arrow

keyboard_arrow_right

Listeners:

Top listeners:

skip_previous skip_next
00:00 00:00
playlist_play chevron_left
volume_up

Cybersecurity

21 Results / Page 2 of 3

Background

Africa

Digital trade protocol for Africa: why it matters, what’s in it and what’s still missing

    By Franziska Sucker, University of the Witwatersrand   In February 2024, African heads of states adopted a draft protocol to regulate digital trade within the continent. This significant yet challenging course for Africa’s digital economy fits into the broader trade agreement, designed to create a single continental market for free movement of goods, services, capital and people. Franziska Sucker explains the protocol, why it matters and what still […]

todayApril 2, 2024 5

Science & Technology

Should governments ban TikTok? Can they? A cybersecurity expert explains the risks the app poses and the challenges to blocking it

Is a wildly popular social media app a threat to U.S. citizens? AP Photo/Michael Dwyer     By Doug Jacobson, Iowa State University   The U.S. House of Representatives voted 352-65 on March 13, 2024, to require TikTok’s parent company, China-based ByteDance, to sell the app or face a nationwide ban on TikTok. President Joe Biden said on March 8 that he would sign the legislation if it reached his […]

todayMarch 14, 2024 19

Opinion Pieces

NIST-CSF 2.0 – A Namibian Pipedream or Reality?

Opinion Piece, by Tyrone Nashandi   The National Institute of Standards and Technology (NIST) has made significant changes to its popular Cybersecurity Framework (NIST-CSF). That will leave organizations mulling over how this affects their cybersecurity programs. More specifically, my favorite - the new "Govern" function. As a result, organizations having tirelessly identified gaps, may have to reanalyze their existing assessments and remediation activities to dissect the impact of the framework […]

todayMarch 11, 2024 25

Business / Economics

Know the most common types of bank frauds

By Bank Windhoek’s Forensics Services Manager, Johnny Truter. International law states that any illegal act involving deception to obtain money from a financial institution or a bank's depositors is categorised as bank fraud. Like other fraud offences, bank fraud involves using a trick to obtain money illegally. Nowadays, fraudsters are continuously coming up with different ways to steal people’s hard-earned money. The following looks at the most common trends used […]

todayFebruary 27, 2024 20

World

Google’s open-source AI to fight malware threats

Google is launching an AI-powered open-source tool to identify file types and detect malware, expanding its protection to products like Gmail and Google Drive. Bloomberg News reports that the tool will be offered for free and is outlined in a white paper that was released at the Munich Security Conference on Friday, and advocates for advanced AI research and guidelines on autonomous cyber defenses.

todayFebruary 19, 2024 11

Science & Technology

Identity at the core of Zero Trust: becoming cyber secure in education

In an age marked by an unprecedented surge in cyberthreats and data breaches, the importance of cybersecurity has reached new heights. Organisations worldwide are grappling with a mounting tide of cybercrime, with estimates from Cybersecurity Ventures projecting that cybercrime would cost the world a staggering $8 trillion in 2023; a number expected to soar to $10.5 trillion by 2025.  It's a daunting reality that no one can afford to ignore, regardless of […]

todayFebruary 14, 2024 194

0%