Your data is being held hostage by cyber criminals. What now?

It’s any company’s worst nightmare – an employee in the organisation unknowingly downloads an email attachment containing malware, and within minutes your system has been hijacked and all your data encrypted. To make matters worse, the perpetrators...

Cybersecurity is a process not a destination

If we are to understand the most important theme of the recent cybersecurity month, which as always, is accompanied by a host of articles around trends and best practice, it’s pertinent to start with an analogy about our personal homes. By Antony Russell, chief...

Cloud security is a shared responsibility

With an increasing number of organisations moving their infrastructure and services to the cloud, many are adopting multi-cloud strategies, meaning that a host of different cloud computing and storage services are used in one heterogenous architecture. By Gerhard...

Stolen credentials a flourishing underground market

When you think about your social media accounts – for example, your Facebook password – does it have anything in common with your LinkedIn or bank account credentials? Does it have the same password as your business account? If so, you are not alone....

What does the rise of edge computing mean for cybersecurity?

As the number of users and devices connected at the ‘edge’ of a network continues to grow, organisations are increasingly distributing their computing ability and network resources closer to where those users and devices are located. By Prenesh Padayachee,...