Cyber-security a business issue, not an IT issue

Some have said, only half-jokingly, that an innovation only gets the investment they need to be perfected once the arms industry has seen a need for it. More worryingly, there is now good evidence that much of the innovation is being driven by increasingly organised,...

Where do we go from here?

Mike Concertino, chief information security officer and vice-president: information security at F5 Networks, looks at how the debate between privacy and security is evolving. Some of you may remember a time when national security was a question of police officers...

Collaboration makes cloud securer

The same model of sharing data and intelligence employed by those who create the threats to our organisations should inform our approach to meeting them head on. And cloud gives us a key means to do this, writes Trevor Coetzee, regional director, South Africa and...

Video analytics: fashion or functional?

It has almost been a decade since video analytic (VA) software for the IP camera market appeared, and given the noise surrounding this technology, it is reasonable to question the value of many of the offerings, debate what is fashion instead of function and ask...

Holding your phone hostage: how ransomware went mobile

Doros Hadjizenonos, Country Manager of Check Point South Africa explores why mobile ransomware has become the biggest mobile security threat, and how users can guard against it. Imitation is a quick way to learn, which is why mobile malware is evolving so rapidly...

Outsmart the bad, safeguard the good

Preventing the loss of critical or sensitive data has been an issue for as long as there has been proprietary information and intellectual property, writes Perry Hutton, regional vice-president of Fortinet Africa. But recent developments both in regulatory...