A look at the 2016 security landscape

A couple of years ago, the security industry claimed the anti-virus industry was dead. This isn’t strictly true. On one side, pure anti-virus companies do not exist any longer, but instead of security companies limiting themselves to a single, traditional...

Protect your big phish from whaling attacks

One of the largest online security threats to individuals and businesses today doesn’t come from new sophisticated malware tools, but rather from distinctly low-tech phishing and whaling campaigns, writes Simeon Tassev, director and QSA at Galix Networking. A...

How is banking fraud committed?

As more and more banks migrate banking services to mobile, enterprising and sophisticated (often globalised) criminal networks have devised ever ingenious ways to use mobile phones to separate customers from their money. This is according to  Tjaart van der Walt,...

Issues around WhatsApp end-to-end encryption

There is and always has been an inherent tension between an individual’s right to data privacy and wider security concerns, writes Aleks Gostev, chief security expert: GReAT at Kaspersky Lab. This is unlikely to change, although the priority may shift depending...

IAM helps fight the insider threat

The past few years have seen a flood of breaches and hacks littering the headlines around the world. While a big fuss has been made about cyber-security in the wake of these events, there has been little noise about security within the business. The insider threat...

Put the user at the centre of your security solution

A lack of policy-driven consequence is putting corporate South Africa at risk of being vulnerable to cyber attacks. Organisations often view security as a grudge purchase, resulting in them not adequately protecting their data assets. This, coupled with complex or...