Issues around WhatsApp end-to-end encryption

There is and always has been an inherent tension between an individual’s right to data privacy and wider security concerns, writes Aleks Gostev, chief security expert: GReAT at Kaspersky Lab. This is unlikely to change, although the priority may shift depending...

IAM helps fight the insider threat

The past few years have seen a flood of breaches and hacks littering the headlines around the world. While a big fuss has been made about cyber-security in the wake of these events, there has been little noise about security within the business. The insider threat...

Put the user at the centre of your security solution

A lack of policy-driven consequence is putting corporate South Africa at risk of being vulnerable to cyber attacks. Organisations often view security as a grudge purchase, resulting in them not adequately protecting their data assets. This, coupled with complex or...

Prepare for the threat of exponentially expanding data

At the turn of the previous century, fears ran rampant that PCs would fall victim to the fabled Y2K bug, plunging a very computer dependent world into instant chaos. That may have been a storm in a teacup, but now there is a very real consideration that needs to be...

Secure your organisation from insider threats

Living in an increasingly networked world has its advantages, but it also leaves organisations vulnerable to exploitation by malware, inadvertent employee actions and malicious attacks. Data security breaches can be devastating in terms of cost and reputation so...

What are the cyber-threats in the financial sector?

Cyber threats can be broadly categorised as either a Computer Network Attack (CNA) – aiming for the disruption, degradation or destruction of information and systems; or Computer Network Exploitation (CNE) – which focuses on accessing, stealing and...