Cloud security is a shared responsibility

With an increasing number of organisations moving their infrastructure and services to the cloud, many are adopting multi-cloud strategies, meaning that a host of different cloud computing and storage services are used in one heterogenous architecture. By Gerhard...

Stolen credentials a flourishing underground market

When you think about your social media accounts – for example, your Facebook password – does it have anything in common with your LinkedIn or bank account credentials? Does it have the same password as your business account? If so, you are not alone....

Let Black Friday stand for great deals, not dark times

Black Friday got its name from the idea that retailers would, in a single day, shift their balance sheets from red to black. Unfortunately, black is now the mood left behind after bank balances and systems have been compromised due to cybercriminals taking advantage...

Cloud is the way to digitise commercial construction

There is a significant increase in investment in cloud computing within the commercial construction industry because the technology is recognised as the best way to facilitate digital transformation. This is according to Morag Evans, CEO Databuild, who says these...

Delving into container security

Container security is a fairly new technology, especially when viewed in the context of the speed of light technology changes in the fourth industrial revolution (4IR). Container technology itself is a topic that many security practitioners continue to find confusing,...

What does the rise of edge computing mean for cybersecurity?

As the number of users and devices connected at the ‘edge’ of a network continues to grow, organisations are increasingly distributing their computing ability and network resources closer to where those users and devices are located. By Prenesh Padayachee,...