computing_logo
Sign in Join
    • My account
    • Sign out
  • You are currently accessing Computing via your Enterprise account.

    If you already have an account please use the link below to sign in.

    If you have any problems with your access or would like to request an individual access account please contact our customer service team.

    Phone: +44 (0) 1858 438800

    Email: customerservices@incisivemedia.com

    • Sign in
logo
  • logo

    Search Computing

     

     

  • Latest
  • Topics

    Choose a topic from the list below

    • Diversity in Tech
    • Big Data & Analytics
    • DevOps
    • Security
    • GDPR
    • AI & ML
    • Cloud & Infrastructure
    • CIO
    • Deskflix
  • Tech Impact
  • Diversity in Tech
  • Deskflix
  • Events
  • Whitepapers
  • More

    Most Popular content

    • Delta
    • Big Data & Analytics
    • Cloud
    • Leadership & Strategy
    • Open Source
    • Storage
    • Telecoms
    • Top 100 IT Leaders

    Featured content

    • On-demand webinars
    • Identity Access Management Hub
    • IT leaders 250
    • Research
    • Delta
    • Tech Marketing Hub

    Authors

    • Stuart Sumner
    • John Leonard
    • Tom Allen
    • Computing Contributors

    Computing Resources

    • English
    • Français
    • Deutsch
    • Espagnol
    • Italien
  • Searchlogo

    Search Computing

    x
Join Sign in
 
    • My account
    • Sign out
  • You are currently accessing Computing via your Enterprise account.

    If you already have an account please use the link below to sign in.

    If you have any problems with your access or would like to request an individual access account please contact our customer service team.

    Phone: +44 (0) 1858 438800

    Email: customerservices@incisivemedia.com

    • Sign in
    • Sign in

Eskom

The top 10 biggest security breaches of 2019 (so far)

Security

The top 10 biggest security breaches of 2019 (so far)

Up to ten terabytes of data stolen from Citrix, ransomware outbreaks costing millions and software update systems compromised

clock 05 April 2019 •
Eskom denies its live customer database has been exposed online - but the security specialist who found it disagrees

Security

Eskom denies its live customer database has been exposed online - but the security specialist who found it disagrees

MongoDB database 'does not belong to Eskom and is not hosted on our network', claims Eskom CIO

clock 07 February 2019 •
South African electricity utility Eskom accused of ignoring customer credit card compromise

Security

South African electricity utility Eskom accused of ignoring customer credit card compromise

Names, addresses, energy usage and even full credit card data exposed online by South Africa's monopoly electricity company

clock 06 February 2019 •
Most read
01

Cyberattack stops all deliveries at Wiltshire Farm Foods

29 June 2022 • 2 min read
02

Dark data: "The dirty secret of the ICT sector"

27 June 2022 • 8 min read
03

Eco-warriors: Microsoft Azure vs Amazon AWS on sustainability

29 June 2022 • 12 min read
04

Apple accused of harming browser engine diversity

28 June 2022 • 3 min read
05

Remove TikTok from Apple and Android app stores, urges US official

30 June 2022 • 3 min read
  • Contact us
  • Marketing Solutions
  • About The Channel Company
  • Privacy Settings
  • Terms & Conditions
  • Policies
  • Careers
FOLLOW US

© The Channel Company EMEA
New London House, 172 Drury Lane, London WC2B 5QR.Registered in England and Wales with company registration number 14078896

Loading