Sep 11, 2017
There are mixed opinions about implementing unauthorised, IT applications (apps) within the organisation, a practice known as Shadow IT. Simeon Tassev, MD and QSA at Galix Networking, examines the issue. Opinion on Shadow IT is divided into two camps. Some believe...
Sep 7, 2017
Consider the security risk, urges Simeon Tassev, MD and QSA of Galix. The emergence of the digital world has caused a number of organisations to shift from analogue to digitised environments. Among the many complexities and challenges this transition gives rise to,...
Sep 5, 2017
Every day, several times a day, customers trust businesses with their personal information. A single transaction can generate reams and reams of data. Identification numbers, physical addresses, phone numbers, bank account details — a customer parts with all...
Sep 5, 2017
Industry leaders presented a wide range of topics and case studies at the Cyber Security in Banking Conference recently, highlighting the latest trends and development in cyber security. The event offered a comprehensive and multi-facetted agenda relevant to all...
Sep 4, 2017
Bryan Hamman, Arbor Network’s territory manager for sub-Saharan Africa, examines whether these “myths” are fact or fiction. For anyone in ‘denial’ about the power of Distributed Denial of Service (DDoS) attacks in South Africa –...
Sep 1, 2017
Leo Meyer, MD of Black Castle Technologies, gets under the covers with the mobile security denial syndrome. A myriad of polls over the last year have confirmed what we would expect; consumers don’t want their mobile devices to fall victim to security onslaughts....