Botnets: robots to avoid

Malware has been around in some form for over 40 years, but the use of malware to take control of a group of computers that are then organised into something called a botnet is more than a 21st century phenomenon, says Carey van Vlaanderen, CEO of ESET Southern...

Fighting the outsider threat

It is common sense that the sooner an attack is identified, the faster it can be contained and mitigated, limiting the fallout as much as possible. Businesses need to supplement their traditional security tools and protocols with skilled incident response teams,...

Protection in the IoT age

We all have so many devices and so many technology toys, and we are loving the ability to link our lives to the cloud, says Mark McCallum, Orange Business Services, head of Global Services Africa. We’re learning more about ourselves too, as wearable devices become...

Mobile data encryption and performance

It seems as though there is a new security breach related to data traveling over the Internet almost every day, says Martin Walshaw, senior engineer at F5 Networks. Every day might be an exaggeration of reality, but if it happens to be your data that is stolen or...

An explosion of data breaches and PoS RAM scrapers

Shortly after a massive batch of stolen credit and debit cards went on sale in the underground market pointing to a breach in large retail giant Home Depot, the company has confirmed that their payment systems were compromised. This affected customers who have used...

Security Awareness training needed in SA

With an ongoing increase in threat vectors, largely brought on by the proliferation of business trends such as cloud computing, bring your own device (BYOD), and the Internet of Things (IoT), security awareness and training is becoming a critical aspect to...