Uncloaking corruption within encryption

Encryption is an effective weapon against cybercrime, writes Martin Walshaw, senior engineer at F5 Networks. Securing valuable data flow between applications is essential for safeguarding identity and helping communications between a web browser and a server to remain...

Tallying the ripple costs of a cyber attack

The cost of any type of theft is often a lot higher than just the value of the stolen goods, writes Doros Hadjizenonos, country manager of Check Point South Africa. If your house was broken into, you would feel violated. While your insurance company would reimburse...

Trend Micro TippingPoint launches 100Gb IPS

Trend Micro has announced the availability of the latest Trend Micro TippingPoint NX Series next-generation intrusion prevention systems (NGIPS). The series includes a first-to-market standalone NGIPS solution that delivers up to 100 Gb inspection throughput with low...

Fortinet musters defence against Black Nurse

A well-known characteristic of criminals in any space is that they are unpredictable. They look for holes and vulnerabilities in systems and try to use them to their advantage. Security systems, therefore, have to be architected in a way that assumes attack...

Your smart home: attacker or alibi?

David Emm, principal security researcher at Kaspersky Lab, examines some of the issues around smart homes At the end of 2016, the world discovered just how vulnerable indiscriminately connected Internet-of-Things gadgets could be, when hundreds of thousands of smart...

IoT devices and DDoS attacks in perspective

Bryan Hamman, territory manager for sub-Saharan Africa at Arbor Networks, talks about the issues around DDoS attacks on IoT devices Embedded Internet-of-Thing (IoT) botnets are not a new phenomenon – we’ve seen them leveraged to launch distributed denial...