Newsroom

CYBER1 Solutions in the media

Latest Media

Find the latest CYBER1 Solutions Articles, Events, News and Videos.

cloud service data security concept: computer, tablet, phone, hard drive connected to the cloud made of white paper clips and check-lock on it
Who is responsible for cloud security? 
The widespread adoption of the cloud which skyrocketed during the pandemic widened the attack surface consi...
c1-s-header-100
APIs are valuable targets for attackers
The adoption of application programming interfaces (APIs), has increased significantly over the last few ye...
Neon AI on a keyboard
AI is fast becoming a crucial weapon in the Cyber Securit...
Today, the attack surface in modern entities is vast and is growing every day. This is mostly thanks to inc...
pointing finger cheerful touchscreen choice user security lock key identity safety protect password network internet media privacy technology electronic code system control web information document
Identity is the new perimeter in a cloud-based world
Traditional security perimeters that once protected corporate networks have blurred to the extent that they...
C1S - 28
Start thinking like an attacker
In today’s digital age, it’s more important than ever to be aware of the potential risks of cyb...
c1s-hi-tcs (1)
TCS Impact Series | Cybersecurity: not sure which directi...
Executives from Next DLP and Cyber1 Solutions delve into why leaders need to work together to drive a cultu...
Young African businessman looking at data on computer screen while sitting in armchair in front of several monitors and typing
Zero Trust | What Executives Should Know
Why Is This Important in Cyber Security? The move toward Zero Trust has been one of the more significant...
Critical Observations of The South African Cyber Security Industry
Critical Observations of The South African Cyber Security...
Although there is a wide range of new technologies, trends, and methodologies that could make a real differ...
Black Friday Shopping Online
Black Friday Scams to look out for
The hype around Black Friday could leave you blinded to possible cyber crimes, attacks and scams. We hav...
Close-up view of notepads in hands by laptop on blue wooden table, shopping online and Cyber monday
Cyber Monday: Some facts that will help you in the future!
Don’t be scammed this Cyber Monday by attractive ‘deals’! On one of the biggest shoppi...
DevSecOps Event 28
Shifting Left with DevSecOps Event
CYBER1 Solutions East and West Africa & 9thBit, hosted their very first DevSecOps and Cloud Securi...
Shot of two businesswomen brainstorming with notes on a glass wall in an office.
Cloud Banking: A Great Opportunity or Too Much of a Risk?
In the “Africa FinTech Summit” in 2022, Shalom Onyibe represented Protec in a panel discussing the opportun...
Hacker using computer, smartphone and coding to steal password and private data remotely from car
Case Study: CIO - Cloud security in a hybrid working envi...
It is estimated that over 500 million people use the internet across Africa. From improving, productivity, ...
Shot of a diverse group of businesspeople standing together in the office and using a computer.
Creating a Security First Culture
In the Africa Cloud and Security Summit 2022, Andrew Njoroge appears as part of a panel highlighting the im...
cyber1 s 8
Cloud security in a hybrid working world
Shalom Onyibe addresses the following in Africa Cloud and Security Summit 2022: Why are organisations d...
E&W Internal Launch -15
Transformation and Innovation Internal Team Launch
We launched our new CYBER1 Solutions brand to our incredible group of employees just days before ...
Media Type
Select
E&W Internal Launch -15
Transformation and Innovation Internal Team Launch
We launched our new CYBER1 Solutions brand to our incredible group of employees just days before ...
cyber1 s 8
Cloud security in a hybrid working world
Shalom Onyibe addresses the following in Africa Cloud and Security Summit 2022: Why are organisations d...
Shot of a diverse group of businesspeople standing together in the office and using a computer.
Creating a Security First Culture
In the Africa Cloud and Security Summit 2022, Andrew Njoroge appears as part of a panel highlighting the im...
Hacker using computer, smartphone and coding to steal password and private data remotely from car
Case Study: CIO - Cloud security in a hybrid working envi...
It is estimated that over 500 million people use the internet across Africa. From improving, productivity, ...
Shot of two businesswomen brainstorming with notes on a glass wall in an office.
Cloud Banking: A Great Opportunity or Too Much of a Risk?
In the “Africa FinTech Summit” in 2022, Shalom Onyibe represented Protec in a panel discussing the opportun...
DevSecOps Event 28
Shifting Left with DevSecOps Event
CYBER1 Solutions East and West Africa & 9thBit, hosted their very first DevSecOps and Cloud Securi...