Stop navel-gazing at encryption

We are so enthralled by our own brilliance in cryptography that we forget that most data at rest – tucked away inside databases – is unencrypted. By Lori MacVittie, principal technical evangelist at F5 Networks Case in point, a Skyhigh analysis of...

Certified protection to counter banking malware threats

These days, there isn’t much that can’t be done on mobile, and that includes banking. For many people, banking apps are the go-to method of managing finances. As a result, mobile banking malware targeting Android phones has become a serious and somewhat...

Build a human firewall to fight human errors

With Kaspersky research showing 970 557 phishing attacks detected in South Africa in Q1 2019 alone – an average of 10 783 per day – and 53 829 mobile malware attacks in the same period – an increase of 6% compared to Q1 2018 – one has to ask...

Protecting cryptocurrency in Africa

With bitcoin experiencing a price rally recently, interest in this and other cryptocurrencies are regaining momentum. The potential disruption from these digital currencies, especially in Africa, can be significant for traditional financial service providers. However,...

Four essential cloud security concepts

Possibly the most important attribute of the cloud is that critical business applications, can be deployed, managed, and distributed faster and easier than by any other method, giving employees and customers real-time access to critical information–wherever they...