Protect your business from cybercrime

Obtaining sensitive data is the primary objective for cybercriminals when targeting businesses. Sensitive data can vary depending on the organisation but examples include intellectual property, source code, trade secrets, customer and employee personal identifiable...

Will the Fourth Industrial Revolution be safe?

The convergence of the digital and physical worlds is more than a MasterCard rally cry, writes Ajay Bhalla, president: enterprise security solutions at MasterCard. It is in fact a fundamental shift that’s driving the Fourth Industrial Revolution or Industry 4.0,...

Cloud-based security best for multiple remote threats

Cloud-based security solutions are the more effective and most immediate way for companies to deal with security threats arising from the multiple internet access points created by employees on their devices from remote places. This is according to Richard Broeke, an...

Security, security, security

Jason Dover, director: product line management at KEMP Technologies explores the security imperative for today’s complex networks. It is every CISO’s worst nightmare – the phone call in the middle of the night to say that a security breach has...

DDoS protection needs a multi-faceted approach

With distributed denial of service (DDoS) attacks becoming more complex and sophisticated, so must any defensive strategy that attempts to fully protect a financial institution. This is according to Arbor Networks, the security division of Netscout. While traditional...

Fighting the scourge of blog spam

Back in the late 90s, a new type of journalism emerged, alongside the advent of free publishing platforms. At the time, no one knew blogging would become one of the most important platforms of expression, and the sharing of news and ideas, forever altering the face of...