What does the rise of edge computing mean for cybersecurity?

As the number of users and devices connected at the ‘edge’ of a network continues to grow, organisations are increasingly distributing their computing ability and network resources closer to where those users and devices are located. By Prenesh Padayachee,...

OT the new feeding ground for cyber-attacks

Before the advent of Industrial Internet of Things (IIoT), operation technology (OT) was safeguarded against most cyberattacks. OT systems’ propriety nature, standards and hard-wired connectivity protected it against malicious attacks. By Johan Potgieter,...

Banks move intruder systems to lithium battery technology

Banks have been challenged with load shedding to keep security systems operational and specifically intruder systems. As the level of load shedding intensified, lead acid batteries which were being used by most banks to run intruder systems, were showing a significant...

Turn your employees into human firewalls

Cyber-security is a term on every businessperson’s mind, as the legal, financial and reputational implications of a breach are massive. The challenge is that, while a company can implement the best cyber-security technologies, the biggest threat to a firm remains its...

Recover from cyberattacks in minutes – not days, weeks or months

As cyberattacks continue to rise, enterprise storage cyber resilience and data protection is essential for enterprises – it is a matter of when and not if an enterprise will suffer from a cyberattack. By Hayden Sadler, country manager for South Africa at Infinidat The...