Is your IoT edge infrastructure secure?

“Curiouser and curiouser,” said Alice. Alice didn’t know it, but she summed up nicely the IoT edge landscape. By Bevan Lock, data centre solutions expert at Lenovo Just as Alice was constantly reacting to the new and unexpected dangers of Wonderland,...

SMEs need a different approach to cyber security

Even though the small to medium enterprise (SME) segment is the lifeblood of South Africa’s economy, not enough is being done to educate business owners about the importance of cyber security. This is especially relevant when safeguarding the perimeter from...

Cyber security at the rugby world cup

Get the braaivleis and biltong ready because this year’s highly anticipated rugby world cup in Japan will be the biggest and most tech-enabled event the world has ever seen. Simon McCullough, F5 Networks’ major channel account manager, discusses the cyber...

The rise of nation-state attacks

A new phase of cyber warfare has begun. Simon McCullough, major channel account manager at F5 Networks Hackers acting on behalf of nation-state powers are no longer just out to disrupt critical infrastructures – they’re also actively seeking trade secrets....
Security Terminology Demystified: Phishing

Security Terminology Demystified: Phishing

Oh no! The bank is about to close my overdraft! I should definitely click on this link and get this sorted out … Stop. Don’t click on the link. Don’t open the attachment. Don’t fill in those details. And definitely don’t hand over your personal information. When...

Users still the weakest link in the IT security strategy

Cyber security threats are constantly evolving but one remains the same – users. When asked whether users really are still the weakest link in companies’ cyber security defence strategy, Michael Morton, Solutions Architect at Securicom, says: “Yes,...