SA operational technologies open to attack

South African operational Industrial Control System (ICS) /SCADA systems are becoming increasingly intelligent and connected, and therefore increasingly at risk of attack. “While a major breach has not yet been reported in South Africa, it is only a matter of time...

The rise of security as a service

The constant evolution of the global security threat landscape is playing a part in the rise of cyber ‘security as a service’ offerings. In addition, the evergreen discussion around cost modelling, namely the “capex versus opex?” issue, is also a factor in the...

Can industrial security drive ops, productivity and profitability?

With so many moving parts, industrial and manufacturing concerns have a broader risk profile, writes Neil Cameron, Johnson Controls area GM: building efficiency – Africa. This means their security solutions need to work harder–the safety of people and...

Cybersecurity in an the era of interconnectivity

Within the modern business environment, employees can communicate and collaborate with customers and colleagues from anywhere and anytime, using virtually any device or platform because of technology trends such as mobility and cloud computing. In this era of...

Is less more when it comes to perimeter design?

Perimeter security is essential to prevent crime and create alerts before an intruder enters a company’s premises or a residential complex/gated community in order to protect people and assets. However, legacy systems and technologies are rapidly becoming...

Demystifying security analytics

Security professionals are dealing with an increasing number of advanced and persistent threats. The reality is that they often cannot assess and respond to these threats effectively and in a timely manner, and are subsequently turning to new technologies to help them...