One-size-fits-all approach not be enough to secure IoT

Securing the Internet of Things (IoT) is something which cannot be done with a one-size-fits-all approach – and every kind of connected object must be assessed individually. This is according to Steve Hanna, co-chair of the Trusted Computing Group’s (TCG)...

Cloud security must be prioritised

For many South African organisations, the cloud is becoming an indispensable part of the standard operating procedure required for the digital landscape. And, thanks to the arrival of multinational data centres in the country, more decision-makers are experimenting...

Cybersecurity: focus on your people, lose the siloes

Ask any South African company what their major headaches are right now, and chances are that security will be near the top of the list. By Daniel Lotter, head of innovation at Itec South Africa Not just the burglar bars and CCTV type of security, either: as cybercrime...

Digital transformation’s growing attack surface

Traditional business models need to be reimagined as digital transformation continues to enable businesses to innovate and find new ways to not only leverage data but keep abreast of customer’s evolving requirements. While this presents innumerable...

Tips for keeping your business safe online

No business, whether large or small, can afford to ignore cybersecurity, and the pressure to protect businesses is mounting as cybercriminals hone their skills to target a company’s weakest points. While bigger corporations generally have large IT departments to...

Stop navel-gazing at encryption

We are so enthralled by our own brilliance in cryptography that we forget that most data at rest – tucked away inside databases – is unencrypted. By Lori MacVittie, principal technical evangelist at F5 Networks Case in point, a Skyhigh analysis of...