Building a zero trust environment

People are the new perimeter and identity is at the very core of maintaining a secure, trusted environment. New technologies and trends, including the mobile workforce, BYOD, IoT, digital transformation, and the consumerisation of IT, are shifting identity and access...

AI in cybersecurity – friend or foe?

It’s no news that advances in AI and machine learning have enormous transformative potential for cybersecurity defences. Simon McCullough, major channel account manager at F5 Networks However, rapid advances in technology also result in big opportunities for hackers...
Security Terminology Demystified: The Virus Edition

Security Terminology Demystified: The Virus Edition

The file scrambler, the data hoarder and the ransom demander – ransomware isn’t fun for anyone … You’ve read our comprehensive guide to cybersecurity threats and you’ve hopefully read our inside guides to Ransomware and Malware but now it is time to delve deep...

Stand to lose everything through lack of awareness

There is growing number of attacks and almost all the successful attacks have come from an insider being compromised through deception, negligence or a lack of awareness. In this era of endless cyberattacks, companies need to attack or face being attacked and stand to...

Reclaiming the inner city with visible public CCTV

Drugs, prostitution, armed robbery, rape and hijackings are just a few of the crimes that plague the downtown streets of cities like Durban, KwaZulu-Natal. By Mark Chertkow, director at Graphic Image Technologies Within walking distance of tourist hotspots like the...

Do personality traits matter when it comes to cyber security?

In the digital era, cyber-crime is a high-stakes business, with criminals constantly upping the ante in a bid to gain access to valuable data. By Anna Collard, MD and founder of Popcorn Training Criminals know it’s easier to hack a human than trying to break...