Security challenges in the multi-cloud

The cloud argument has been settled and there is no doubt on the minds of the CIO and IT in general that the cloud is now just an extension of one’s infrastructure. The current debate on the table is the adoption of a multi- or dispersed-cloud approach –...

Collaboration key to protecting critical infrastructure

National power grids are increasingly becoming a target of hackers and attacks. Several hacks have been reported across the globe in recent years, drawing the world’s attention to the vulnerability of national power supply systems, and bringing into question the...

What’s causing today’s IT security gap?

What’s stopping global businesses from protecting their assets despite significant investments in cyber security programmes? That’s the question we asked ourselves when trying to determine what the reasons are behind the dangerous gap in modern IT...

Stay safe from mobile threats during the holidays

Digital transformation has pushed employees to use their personal devices for work. BYOD was previously a privilege extended to employees, but now becoming a critical component of today’s business infrastructure strategy. This problem is about to get worse as we...

The hidden cost of cryptojacking

After gaining momentum in mid-2017, we have seen a worldwide boom of digital cryptocurrencies like Bitcoin. Cryptocurrencies have become synonymous with Ransomware attacks, but now cybercriminals have discovered another way to make money – mining...

Card skimming gets more aggressive

Card skimming – the act of copying data from a credit card either to make a physical or virtual copy of the card – is not a new tactic for criminals. As a result, many an unsuspecting card payer has been unpleasantly surprised by unauthorised payments made...