How to be safer than Sony

In late November 2014, Sony was the victim of a cyber-attack that involved the release of stolen data, including yet-to-be released films. The hack not only destroyed data, but it also impacted present and former employees – exposing private e-mails and personal...

IAM trends for 2015

CA Technologies announced five key trends for security and identity and access management (IAM) that will impact organisations and security professionals in 2015 as they compete in the application economy. “The impact of data breaches in 2014, coupled with the demands...

Cybercrime, hacking a worry for SMBs

Cybercrime costs the global economy $445-billion annually, and cyber espionage and stealing personal information is believed to have affected more than 800-million people during 2013. Although the perception of the risk of cybercrime is increasing (9% from 38% in 2011...

Smart homes easy prey for hackers

While the increasing use of home automation technology to create your version of a “smart home” may be trendy and seem practical, Richard Keymer, head of pre-sales at SecureData Africa, warns of the flip-side in that once an automation system is established and can be operated remotely online, then chances are it can be hacked.

Securing the new era of big data

In the digital age, information is the new currency. And in order to get information, enterprises are mining data – and lots of it – for the knowledge that it can yield, says Perry Hutton, Fortinet Africa regional director. On the scale of Internet commerce or social...

Steps to application-aware data protection

Many IT organisations have had the same data protection tools and practices for years, even decades, and see no need for that to change. However, Application Owners need to know that they’ll be able to recover their data at the application level when disaster strikes,...