Integrated security a must

Businesses are under constant pressure to prevent security breaches by cunning and sophisticated adversaries that are targeting their most sensitive data. These attacks can have devastating consequences for organisations – putting their staff and customers at...

Botnets: robots to avoid

Malware has been around in some form for over 40 years, but the use of malware to take control of a group of computers that are then organised into something called a botnet is more than a 21st century phenomenon, says Carey van Vlaanderen, CEO of ESET Southern...

Fighting the outsider threat

It is common sense that the sooner an attack is identified, the faster it can be contained and mitigated, limiting the fallout as much as possible. Businesses need to supplement their traditional security tools and protocols with skilled incident response teams,...

Protection in the IoT age

We all have so many devices and so many technology toys, and we are loving the ability to link our lives to the cloud, says Mark McCallum, Orange Business Services, head of Global Services Africa. We’re learning more about ourselves too, as wearable devices become...

Mobile data encryption and performance

It seems as though there is a new security breach related to data traveling over the Internet almost every day, says Martin Walshaw, senior engineer at F5 Networks. Every day might be an exaggeration of reality, but if it happens to be your data that is stolen or...

An explosion of data breaches and PoS RAM scrapers

Shortly after a massive batch of stolen credit and debit cards went on sale in the underground market pointing to a breach in large retail giant Home Depot, the company has confirmed that their payment systems were compromised. This affected customers who have used...