Battling the enemy within

The world moves swiftly; the IT security world even more so. Just a couple of years ago, securing the enterprise would basically consist of protecting an organization from external intruders. Today, the battle has changed ground. By Michael Xie, founder, president and...

How to protect your device from mobile malware

Mobile malware is on the increase and the purpose of almost all of it is to generate income for cybercriminals. Some malware can monitor devices for banking transactions, gathering sensitive details like passwords and account numbers. Quite common is malware that...

How to build a successful application-security programme

Although #Great (corporate) Wall of China never trended on underworld Twitter sites, so far as we know, there’s no real doubt that firewalls have well and truly failed as effective ways to secure corporate systems and data. The number of breaches reported daily...

Cybercrime is the new reality

“Were you a victim of cybercrime last year?” asks Anton Jacobsz, MD of Networks Unlimited. “It is a valid question to ask just about any business these days as technical sophistication and reasons for cybercrime have evolved significantly in the past...

Security predictions for 2016

2015 was not the best year for cyber-security. Thomas Fischer, principal threat rfor Digital Guardian, looks at the highest profile hacks of 2015 and how cyber security will evolve in 2016. An increase in Wiper attacks Wiper attacks, which erase files from...

The security challenge in 2016

It is a fact that cyber-attacks are growing more sophisticated.  Protecting a company’s information and data seems to be an arduous and complicated task, and finding trained personnel willing to combat continuing attacks gets more difficult all the time.However,...