It’s the end of passwords as we know it

Imagine it’s October 2050 and a school class is on a Cybersecurity Awareness Month field trip at the local museum. Suddenly, a student asks his teacher “what’s that?” staring at some strange combination of letters, symbols and numbers. “Oh, that’s a password,” the...

Hardware-based remote access solutions key to hybrid work security

As South Africa continues to grapple with the Covid-19 pandemic, the outbreak of the fourth wave and the discovery of the new omicron variant of the virus have likely scuppered the hopes of businesses seeing their employees return to the office any time soon. By Benji...

Better quality security requires synchronicity

There’s a lot of talk about cyber security – and for good reason. Barely a week passes without news of yet another high-profile breach, either in South Africa or abroad. By Antony Russell, chief technology officer of Telviva Perhaps the biggest risk for...

Looking for trouble – cybersecurity for the digital age

Faced with relentless growth in cyberattacks, coupled with the complexity of today’s digital ecosystem, how should your business respond? Bas Burger, CEO: global at BT, shares his insights. There’s no going back. Over the past 18-months, businesses have got to grips...

Clearly defined roles and responsibilities critical for cloud security

When it comes to cloud versus on-premises infrastructure, security requirements remain the same, although the cloud requires additional controls because it is publicly available. By Simeon Tassev, MD and QSA at Galix The major difference is that on-prem has highly...

With ransomware, hindsight is 20/20

There are few things worse than discovering that your business has been compromised. Be it a phish, ransomware, hack or malicious attack, it’s going to leave a long legacy of damage and complexity behind it. This is according to Martin Potgieter, co-founder and...