Create a cybersecurity culture

‘Cybersecurity’ is still a relatively new word, making its first appearance to reference “protecting a computer or computer system” in 1989. Since then, the term has evolved to incorporate every aspect of IT, information and cyber security. By...

Are we prepared for 2019’s cyber security challenges?

“Technology is a queer thing. It brings you great gifts with one hand, and it stabs you in the back with the other,” wrote novelist and scientist CP Snow in the New York Times in 1971. It still rings true today. Every new tool or technology we use...

Will Chrome update stop online ad abuse?

Google has taken another positive step toward making the Internet a safer place with the launch of Chrome 71. By Grant Hamilton, Check Point country manager South Africa Building on the ad-blocking measures introduced in Chrome 64 and 68, which prevented sites from...

Security challenges in the multi-cloud

The cloud argument has been settled and there is no doubt on the minds of the CIO and IT in general that the cloud is now just an extension of one’s infrastructure. The current debate on the table is the adoption of a multi- or dispersed-cloud approach –...

Collaboration key to protecting critical infrastructure

National power grids are increasingly becoming a target of hackers and attacks. Several hacks have been reported across the globe in recent years, drawing the world’s attention to the vulnerability of national power supply systems, and bringing into question the...

What’s causing today’s IT security gap?

What’s stopping global businesses from protecting their assets despite significant investments in cyber security programmes? That’s the question we asked ourselves when trying to determine what the reasons are behind the dangerous gap in modern IT...