Demystifying security analytics

Security professionals are dealing with an increasing number of advanced and persistent threats. The reality is that they often cannot assess and respond to these threats effectively and in a timely manner, and are subsequently turning to new technologies to help them...

Protect your communications network and IP

Voice over Internet Protocol (VoIP) has become an integral aspect of modern day businesses around the globe, taking the productivity of your workforce to new heights by making yourself available to your clients from remote locations where before, this was not a...

Keep your ID safe in the cybersphere

Over the course of the past decade, the brick-and-mortar institutions of yesteryear have rapidly been replaced by online counterparts, with South Africans now turning to the Internet to perform banking transactions, book flights and even shop for groceries. While this...

Meet the next generation of cybersecurity

Millennials, the name given to the demographic cohort born between about 1980 and 2000, are members of what is now the largest living generation. As they mature into 20- and 30-something professionals, they are taking over the helm from their parents across all...

A zero-trust approach to cybersecurity

Today’s cybersecurity threats have matured well beyond viruses, and the stakes have grown too. While cyberattack on users’ identities and bank accounts continue to dominate headlines, it is no longer just data that’s at stake as the Internet of...

Two-factor authentication an underutilised measure

Whenever a business considers the security measures it can implement, three options always crop up: antivirus on endpoints and servers to detect and eliminate as many threats as possible; backups to ensure that any data lost in an incident such as a ransomware attack...