Get the attacker’s view on your cyber defence

Steve Benton, deputy-chief security officer and, GM: cyber and physical security operations and programmes at BT, shares his insights on the five core aims of cyber attackers – and the multi-layered defence approach that could stop them targeting your business....

The changing face of ransomware

There is a significant decrease in the sheer number of ransomware attacks due to improved security, better backup strategies and faster data recovery measures. By John Mc Loughlin, CEO of J2 This has meant that the spray and pray approach is no longer effective for...

Let’s talk cyber hygiene

Organisations in the Covid-19 pandemic era have been forced to look at their security hygiene best practices in order to minimise risk, data leakage and non-compliance, while still allowing for operational flexibility and efficiency. By Stefan van de Giessen, GM:...

Trust is good, but a zero-trust mindset is better

A few months ago, commuting to work, entering a crowded elevator, and sitting down in an open workspace next to several colleagues were trivial everyday activities. Amir Sohrabi, area vice-president: emerging markets at Citrix Unfortunately, with the current global...

What does Covid teach us about OT cybersecurity?

Today, almost no discussion about any subject goes on for long without the current pandemic being brought up in some way. Joe Robertson, EMEA CISO at Fortinet It dominates all of our lives in many ways. Of course, life must go on, business does continue. But not in...

Africa’s mobile cybercrime challenge

In June 2020, Upstream’s Secure-D anti-fraud platform revealed that the total number of malicious mobile applications doubled in the first quarter of the year. The analysis found 29 000 malicious apps (14 500 in 2019), a 55% spike in fraudulent mobile...