Zimbabwe to review Domain Name System framework

What's in a
domain name? 

Zimbabwe to review
its system.
.

Tuesday, Jul 16th

Sudan's military council restores internet

Sudan's military council restores internet

Opposition party says most important factor is restoration the result of judicial order.

South African IT managers, supply chains under siege

South African IT managers, supply chains under siege

Sophos global survey shows IT teams struggle with a lack of expertise, budget and up-to-date technology as multiple cyber attack tactic takes hold.

MTN Nigeria server hit by suspected cyber criminals

MTN Nigeria server hit by suspected cyber criminals

MTN has reportedly lost R28m in in just under two hours when suspected cyber criminals attacked its server on Saturday.

Many EMEA businesses unsure of their security tech

Many EMEA businesses unsure of their security tech

Market research shows that despite continued investment in security solutions, only 25% of respondents in the region are confident about their cyber security.

iWay Africa Kenya, Panda Security form cyber alliance

iWay Africa Kenya, Panda Security form cyber alliance

Companies look to take on advanced cyberattacks, risky employee behaviour, among other challenges.

Cameroonian telcos in hot water over SIM card registration

Cameroonian telcos in hot water over SIM card registration

Regulator claims some cards have been activated with no proof of identity.

Sophos acquires Rook to boost MDR service delivery

Sophos acquires Rook to boost MDR service delivery

Network and endpoint security firm plans to create re-sellable MDR services.

Ethiopia losing US$4.5 million daily due to internet shut down

Ethiopia losing US$4.5 million daily due to internet shut down

Nationwide shutdown following coup attempt.

Kenya: government websites attacked

Kenya: government websites attacked

Latest incident brings into question the country's official state of readiness to deal with cyber threats.

Safaricom launches anti-fraud API for mobile transactions

Safaricom launches anti-fraud API for mobile transactions

Intention to formulate a framework to share user information with financial institutions.

EDR, EPP convergence to strengthen neglected endpoint

EDR, EPP convergence to strengthen neglected endpoint

Traditional antivirus alone is not enough as endpoint remains most vulnerable part of ICT infrastructure.