Cloud security is a shared responsibility

With an increasing number of organisations moving their infrastructure and services to the cloud, many are adopting multi-cloud strategies, meaning that a host of different cloud computing and storage services are used in one heterogenous architecture. By Gerhard...

Stolen credentials a flourishing underground market

When you think about your social media accounts – for example, your Facebook password – does it have anything in common with your LinkedIn or bank account credentials? Does it have the same password as your business account? If so, you are not alone....

What does the rise of edge computing mean for cybersecurity?

As the number of users and devices connected at the ‘edge’ of a network continues to grow, organisations are increasingly distributing their computing ability and network resources closer to where those users and devices are located. By Prenesh Padayachee,...

OT the new feeding ground for cyber-attacks

Before the advent of Industrial Internet of Things (IIoT), operation technology (OT) was safeguarded against most cyberattacks. OT systems’ propriety nature, standards and hard-wired connectivity protected it against malicious attacks. By Johan Potgieter,...

Banks move intruder systems to lithium battery technology

Banks have been challenged with load shedding to keep security systems operational and specifically intruder systems. As the level of load shedding intensified, lead acid batteries which were being used by most banks to run intruder systems, were showing a significant...