Proactively defending your network

Cyber attacks occur with increasing speed and sophistication. Advanced persistent threats (APTs) that are tailored to infiltrate a network and target specific information are a reality, and are only going to become more pervasive. In today’s world of the...

Staying secure in the mobile-first, cloud-first era

The operating environment for organisations of all sizes has changed as a result of technology trends such as cloud computing, big data analytics, and the Internet of Things. Consequently, the security landscape has also undergone significant change in the last few...

Security and IoT: can they be compatible?

Robert Miller, head of operational technology at MWR InfoSecurity, unpacks the topic of security in the Internet of Things (IoT) environment. In a world of interconnected devices, it can be all too easy for consumers and businesses alike to focus purely on the...

No shame in IT security breaches

One of the first steps to addressing a public health crisis is taking the shame out of it, writes Matthew Gardiner, senior product marketing manager at Mimecast. This, for example, was something that had to be learned during the early days of the AIDS crisis in the...

Ambidextrous security posture enables transformation

As businesses face mounting pressure to evolve everything in their organisation – from technology, to processes, to market strategies – cyber-security becomes ever more essential. Unfortunately, it also becomes ever more complex, writes Paul Jolliffe, DSM...

Avoidance a tool in fight against cyber-crime

Cyber-crime will become an increasingly common threat to South African companies and individuals, according to Grant Thornton. In the future, one alternative to offset potentially catastrophic consequences, although against conventional wisdom and hype, might be to...