The new cyber-norm

Today is D-Day for banks and the City of Johannesburg to pay ransom demands sent through by hackers last week. Bryan Hamman, Regional Director at NETSCOUT, which offers NETSCOUT Arbor, specialising in advanced DDos protection solutions, offers this explanation of DDoS...

Protect yourself on business trips

Business executives who are keepers of secrets of the company are high-priority targets for cyber espionage. Especially, when traveling, precautionary measures – including those outside the world of IT – are essential, and they must be accompanied by an...

Do you know what’s lurking in your network?

Is there a ghost in your machine? And no, this is not the beginning of a Halloween story – but perhaps it is fitting that ‘International Cybersecurity Awareness month’ takes place in October, the month of Halloween. This is according to Stefan van de...

What caused the Capital One leak?

Earlier this year, the US credit card provider Capital One suffered one of the most jarring data leaks of the last decade. Sensitive financial data from over 106-million customers had been stolen and made freely accessible on the web for weeks. Now, recent analyses...

AI the perfect cyber defence partner

Building a safe future for business’ critical data requires a collaborative effort between machine learning capabilities and traditional human decision-making. By Alex Healing, senior researcher: future cyber defence at BT In a climate where Internet of Things...

Securing abandoned mines

In mineral-rich South Africa, mining is an important part of the GDP employing nearly half a million people. Vanessa Tyne, senior KAM and team lead at Axis Considering that the sector consists of diamonds, gold, platinum, and coal, it is easy to understand why local...