Aiding mobile device investigations

There’s no doubt that mobile phones are ubiquitous. Out of the roughly 7-billion people who share this planet, 6-billion of them have access to mobile phones, and for many, these devices are the sole entry point to the online world. “On the flip side, the...

FirstRand prioritises model risk management

FirstRand needed to gain a single view of model risk across various franchises, segments and geographies, while meeting compliance obligations.Using SAS Model Risk Management it was able to get a full inventory of credit models, gain an epectation to meet all...

Creating effective cybercrime training

Recent statistics released by Vanson Bourne and Mimecast show that less than half of South African companies are completely confident with the staff training they currently have in place to counter email cyber-attacks. As many as 46% only have some confidence and 6%...

Strengthen your security position

The changing face of IT security is seen in such factors of modern life as the pervasiveness of the Internet, the sheer abundance of mobile devices, the rise of social media, and dramatic shifts in web and cloud-based technology. The Internet of Things (IoT) adds...

Cyber insurance and availability make good bedfellows

With attacks like WannaCry and Petya infecting hundreds of thousands of computers worldwide, many are calling this the Year of Ransomware. Its increased level of threat sophistication and maturity clearly show that even though traditional methods of data protection...

King Price launches cyber-insurance

Most people know whether they have insurance for their stuff, car accidents and theft, and liability, but do they know if they’re covered for cybercrime? Cybercrime is real, and it’s on the increase. In South Africa, 84% of adults who’re online have...