Adding threat intelligence to the security mix

Today’s threat landscape is so complex and fast-paced, it is impossible to prevent every threat or attack. The criminal organisations behind cybercrime are well-funded, and have the technical skills to stay ahead of mitigation tools and techniques. They target...

How to avoid being scammed

From phishing to identity theft, the invasion of privacy, Internet/ATM/wire fraud, file sharing and piracy, counterfeiting and forgery, child pornography, and hacking — cybercrime is a chilling and imminent threat across the globe. With botnets, ransomware, spam...

How to avoid being scammed

From phishing to identity theft, the invasion of privacy, Internet/ATM/wire fraud, file sharing and piracy, counterfeiting and forgery, child pornography, and hacking — cybercrime is a chilling and imminent threat across the globe. With botnets, ransomware, spam...

User lock-down or education?

According to the recent PwC report, The Global State of Information Security Survey 2018, companies around the globe are becoming more reliant on cyber capabilities and this means that, in turn, they must also recognise and manage the associated risks, or make...

The special needs of seaports

As a major entry point into countries across the world, seaports are one of the most preferred methods for transporting goods and cargo for international trade, writes Kamal Mokrani, global vice-president at InfiNet Wireless. Clothes, technology, cars and food are...

Global cyberattacks amplify focus on security

The most recent global cyber-attacks, WannaCry and Petya, have led to renewed focus on cyber security for business, worldwide, writes Alessandro Postiglioni, head of IT security sales at BT in Africa. The risks remain rife as many boards still struggle to set the...