Jul 1, 2022
The reality of the cyber threats posed today is that many threat actors are not rogue operators acting on their own but are, instead, working as part of sophisticated and organised groups, collaborating with other groups within a wider ecosystem of specialists. These...
Jun 29, 2022
By Syed Jawad Imam Jafri, Cyber Security and Privacy Officer (CSPO), Huawei South Africa – For operators’ 5G security, the security and resilience of their networks need to be enhanced, network data and basic user data need to be protected, and network...
Jun 28, 2022
By Syed Jawad Imam Jafri, Cyber Security and Privacy Officer (CSPO), Huawei South Africa – In terms of business operations, it is imperative for Huawei to follow the security design principles of attack and defense. Specifically, enhanced cyber resilience based...
Jun 27, 2022
By Syed Jawad Imam Jafri, Cyber Security and Privacy Officer (CSPO), Huawei South Africa – Huawei has adopted various measures to assure the security for the 5G core network in the practice, from security standards to slice access and management security. ...
Jun 24, 2022
The notion of cyber-attacks seems distant from our daily lives, as we go about our work, social and family lives. By Carlo Bolzonello, country lead at Trellix Cyber-attacks feel like they happen to big businesses who can quickly bounce back from them after the issue...
Jun 23, 2022
Earlier this year, TransUnion was the target of a hacker group who obtained access to one of its servers containing the personal records of a significant number of South Africans. By Chris Norton, regional director for Africa at Veeam The group demanded a $15-million...