Aug 5, 2015
You only have to read these names to know that e-mail and Internet security are under threat: Edward Snowden, Ashley Madison and Sony. Thanks to advances in technology, many of the digital tools used to communicate are no longer secure and this can have far reaching...
Aug 4, 2015
The security war will never be won until all stakeholders – developers, service providers, consumers and everyone else in the value chain – start collaborating, sharing information and having open discussions about the threat landscape. This common sentiment emerged...
Aug 4, 2015
Scores of South Africans woke up to a disturbing reality this week when the British High Commission contacted them to say that their UK Visa Applications together with all supporting documentation were stolen, when the courier van that was transporting these documents...
Jul 31, 2015
Major events in the IT landscape, such as the availability of a new operating system (OS), cannot go by unnoticed, because they affect businesses of all shapes and sizes. Many will ask themselves “should we migrate to a new version and if yes – when?” Anyone who...
Jul 30, 2015
There are several facts that any organisation wishing to secure itself against hackers needs to face. Firstly, if a threat actor really wants to access your system he will. There are too many layers – called the attack surface – each containing their own...
Jul 29, 2015
One of the hurdles facing businesses who are attempting to secure themselves, and minimise cyber security risks, is a number of basic security myths that cause them to set inappropriate goals and allocate their resources ineffectively. Understanding what the real...