Cybersecurity in an the era of interconnectivity

Within the modern business environment, employees can communicate and collaborate with customers and colleagues from anywhere and anytime, using virtually any device or platform because of technology trends such as mobility and cloud computing. In this era of...

Is less more when it comes to perimeter design?

Perimeter security is essential to prevent crime and create alerts before an intruder enters a company’s premises or a residential complex/gated community in order to protect people and assets. However, legacy systems and technologies are rapidly becoming...

Demystifying security analytics

Security professionals are dealing with an increasing number of advanced and persistent threats. The reality is that they often cannot assess and respond to these threats effectively and in a timely manner, and are subsequently turning to new technologies to help them...

Protect your communications network and IP

Voice over Internet Protocol (VoIP) has become an integral aspect of modern day businesses around the globe, taking the productivity of your workforce to new heights by making yourself available to your clients from remote locations where before, this was not a...

Keep your ID safe in the cybersphere

Over the course of the past decade, the brick-and-mortar institutions of yesteryear have rapidly been replaced by online counterparts, with South Africans now turning to the Internet to perform banking transactions, book flights and even shop for groceries. While this...

Meet the next generation of cybersecurity

Millennials, the name given to the demographic cohort born between about 1980 and 2000, are members of what is now the largest living generation. As they mature into 20- and 30-something professionals, they are taking over the helm from their parents across all...