Security and IoT: can they be compatible?

Robert Miller, head of operational technology at MWR InfoSecurity, unpacks the topic of security in the Internet of Things (IoT) environment. In a world of interconnected devices, it can be all too easy for consumers and businesses alike to focus purely on the...

No shame in IT security breaches

One of the first steps to addressing a public health crisis is taking the shame out of it, writes Matthew Gardiner, senior product marketing manager at Mimecast. This, for example, was something that had to be learned during the early days of the AIDS crisis in the...

Ambidextrous security posture enables transformation

As businesses face mounting pressure to evolve everything in their organisation – from technology, to processes, to market strategies – cyber-security becomes ever more essential. Unfortunately, it also becomes ever more complex, writes Paul Jolliffe, DSM...

Avoidance a tool in fight against cyber-crime

Cyber-crime will become an increasingly common threat to South African companies and individuals, according to Grant Thornton. In the future, one alternative to offset potentially catastrophic consequences, although against conventional wisdom and hype, might be to...

Being proactive to protect goods in transit

The transport and logistics sector faces a unique challenge when it comes to securing goods end-to-end throughout the transport process, writes Laurence Smith, executive at Graphic Image Technologies. While areas like warehouses are fairly straight forward to monitor,...

Cybercrimes Bill – much better in 2017

Lucien Pierce, consultant at BDO Cyber Lab, unpacks the new Cybercrimes and Cybersecurity Bill and offers his opinion. The Department of Justice published the Cybercrimes and Cybersecurity Bill, 2017 on 19 January. It is, at first glance, much better than the 2016...