The science of securing cyber skills

Urgent measures need to be taken to bridge the rapidly increasing cybersecurity skills gap, says Martin Walshaw, senior systems engineer at F5 Networks. A recent scientific report found that our memories simultaneously generate two forms of personal experience. The...

What to do if you’ve been compromised

The personal details of millions of South Africans were recently leaked in the Deeds Data Breach — including ID numbers, contact details, addresses, and income estimates. This has opened up the majority of South Africans to identity theft risk, which could...

Blockchain could end identity theft

Somebody could be using your personal information right now to commit fraud. The scary thing is, you wouldn’t know until it was too late — maybe you get a credit card bill running into the thousands or an exorbitant cellphone account for a number you...

Small businesses still cybercrime targets

We’ve seen a great deal of threats highlighted this year, as well as information leaks, IoT botnets and some very evasive ransomware. One could argue that strains of malware are evolving and cyber criminals are becoming bolder. Ransomware is particularly rife...

Ways to fight ransomware

Today, there’s a good chance you know of either an individual or a company who has fallen victim to ransomware. In fact, unless you have been living in the Amazon jungle with no connectivity, you will have heard of the simple, yet terrifying concept of...

Tips for software cybersecurity

Protecting sensitive client information has never been more important, as data breaches and hacks become more prevalent. The heated commentary on South Africa’s Cybercrimes and Cybersecurity Bill, the petition against it and the increased risk of global...