Why ‘castle-and-moat’ protection is no fairy tale

Our changing world, with its more distributed infrastructure and new applications and workloads exposing a larger attack surface, means that perimeter security, while still an important element within an enterprise’s cybersecurity arsenal, is simply no longer...

Do not fall victim to online trading scams

“One of the major obstacles that prevent people from exploring opportunities in online trading are concerns about the security and safety of personal funds and data,” says Dany Mawas, regional director at Infinox. “Rightly so, as stories of online...

The importance of culture in zero trust security

Anna Collard, senior vice-president: content strategy and evangelist at KnowBe4 Africa, talks about the importance of a security culture when employing a zero trust security model. During a preview of this year’s RSA conference, a team from Orange Cyberdefense...

Tiered approach needed for IoT security, storage, analysis

Data growth has been exponentially fast-tracked by digital transformation, the rise of smart devices and the Internet of Things (IoT). By Hayden Sadler, country manager for South Africa at Infinidat However, as IoT devices more than often gather data on the...

Pass the word, especially if it’s your name

World Password Day lands today (6 May) and brings with it the many exciting developments that have changed security and access over the past year. And by ‘exciting’ what’s really meant is ‘scary’. The global move to working from home has...

Fighting cybercrime on four fronts

Research shows that more than 16-million Covid-19-related cybersecurity threats were detected during 2020 – a year when many of our businesses, industries and sectors prioritised working online. These cybersecurity attacks ranged from malicious URLs, to spam...