A chilling portrait of the cyber-threat landscape

The cybercrime space is advancing so rapidly, it can be a challenge to keep up. Experts from world-leading security vendor, Check Point, provide a detailed look at the current threat landscape and, most importantly, what companies need to know. If when you picture...

Two-factor authentication should be a staple

The tools for two-factor authentication have been available for about a decade and in an era of increasing cyber crime, fraud and identity theft, two layers of authentication at least should be a staple for security. But it is not. While some are already graduating to...

Secure the enterprise network with AI

Artificial intelligence (AI) often throws up visions of a futuristic Earth, where self-aware robots are programmed to be ethical in their behaviour and protect human lives at all costs, writes Pieter Engelbrecht, business unit manager for HPE Aruba. It’s clear...

Cybersecurity is everyone’s business

The future of work very much revolves around the future of security, writes Brendan McAravey, country manager of Citrix South Africa. New ways of working offer exciting opportunities to boost employee productivity, creativity, and engagement, but they can’t come...

Quantum cryptography will be ultra-secure

With an increasingly connected world spurring on the perpetual rise of the Internet of Things (IoT), data is firmly establishing itself as the dominant fuel within many organisations, being central to the way they work, writes Ronald Ravel, director: B2B South Africa...

Identity ecosystem must learn from banks’ example

There are clear parallels between the development of financial services and identity verification ecosystems, but the identity ecosystem has to take urgent steps to catch up with the banking ecosystem. By Marius Coetzee, MD of Ideco The recent high-profile identity...