No shame in IT security breaches

One of the first steps to addressing a public health crisis is taking the shame out of it, writes Matthew Gardiner, senior product marketing manager at Mimecast. This, for example, was something that had to be learned during the early days of the AIDS crisis in the...

Ambidextrous security posture enables transformation

As businesses face mounting pressure to evolve everything in their organisation – from technology, to processes, to market strategies – cyber-security becomes ever more essential. Unfortunately, it also becomes ever more complex, writes Paul Jolliffe, DSM...

Avoidance a tool in fight against cyber-crime

Cyber-crime will become an increasingly common threat to South African companies and individuals, according to Grant Thornton. In the future, one alternative to offset potentially catastrophic consequences, although against conventional wisdom and hype, might be to...

Being proactive to protect goods in transit

The transport and logistics sector faces a unique challenge when it comes to securing goods end-to-end throughout the transport process, writes Laurence Smith, executive at Graphic Image Technologies. While areas like warehouses are fairly straight forward to monitor,...

Cybercrimes Bill – much better in 2017

Lucien Pierce, consultant at BDO Cyber Lab, unpacks the new Cybercrimes and Cybersecurity Bill and offers his opinion. The Department of Justice published the Cybercrimes and Cybersecurity Bill, 2017 on 19 January. It is, at first glance, much better than the 2016...

Uncloaking corruption within encryption

Encryption is an effective weapon against cybercrime, writes Martin Walshaw, senior engineer at F5 Networks. Securing valuable data flow between applications is essential for safeguarding identity and helping communications between a web browser and a server to remain...