Jun 12, 2019
People are the new perimeter and identity is at the very core of maintaining a secure, trusted environment. New technologies and trends, including the mobile workforce, BYOD, IoT, digital transformation, and the consumerisation of IT, are shifting identity and access...
Jun 11, 2019
It’s no news that advances in AI and machine learning have enormous transformative potential for cybersecurity defences. Simon McCullough, major channel account manager at F5 Networks However, rapid advances in technology also result in big opportunities for hackers...
Jun 9, 2019
The file scrambler, the data hoarder and the ransom demander – ransomware isn’t fun for anyone … You’ve read our comprehensive guide to cybersecurity threats and you’ve hopefully read our inside guides to Ransomware and Malware but now it is time to delve deep...
Jun 7, 2019
There is growing number of attacks and almost all the successful attacks have come from an insider being compromised through deception, negligence or a lack of awareness. In this era of endless cyberattacks, companies need to attack or face being attacked and stand to...
Jun 7, 2019
Drugs, prostitution, armed robbery, rape and hijackings are just a few of the crimes that plague the downtown streets of cities like Durban, KwaZulu-Natal. By Mark Chertkow, director at Graphic Image Technologies Within walking distance of tourist hotspots like the...
Jun 5, 2019
In the digital era, cyber-crime is a high-stakes business, with criminals constantly upping the ante in a bid to gain access to valuable data. By Anna Collard, MD and founder of Popcorn Training Criminals know it’s easier to hack a human than trying to break...