Being proactive to protect goods in transit

The transport and logistics sector faces a unique challenge when it comes to securing goods end-to-end throughout the transport process, writes Laurence Smith, executive at Graphic Image Technologies. While areas like warehouses are fairly straight forward to monitor,...

Cybercrimes Bill – much better in 2017

Lucien Pierce, consultant at BDO Cyber Lab, unpacks the new Cybercrimes and Cybersecurity Bill and offers his opinion. The Department of Justice published the Cybercrimes and Cybersecurity Bill, 2017 on 19 January. It is, at first glance, much better than the 2016...

Uncloaking corruption within encryption

Encryption is an effective weapon against cybercrime, writes Martin Walshaw, senior engineer at F5 Networks. Securing valuable data flow between applications is essential for safeguarding identity and helping communications between a web browser and a server to remain...

Tallying the ripple costs of a cyber attack

The cost of any type of theft is often a lot higher than just the value of the stolen goods, writes Doros Hadjizenonos, country manager of Check Point South Africa. If your house was broken into, you would feel violated. While your insurance company would reimburse...

Trend Micro TippingPoint launches 100Gb IPS

Trend Micro has announced the availability of the latest Trend Micro TippingPoint NX Series next-generation intrusion prevention systems (NGIPS). The series includes a first-to-market standalone NGIPS solution that delivers up to 100 Gb inspection throughput with low...

Fortinet musters defence against Black Nurse

A well-known characteristic of criminals in any space is that they are unpredictable. They look for holes and vulnerabilities in systems and try to use them to their advantage. Security systems, therefore, have to be architected in a way that assumes attack...