Stolen credentials a flourishing underground market

When you think about your social media accounts – for example, your Facebook password – does it have anything in common with your LinkedIn or bank account credentials? Does it have the same password as your business account? If so, you are not alone....

What does the rise of edge computing mean for cybersecurity?

As the number of users and devices connected at the ‘edge’ of a network continues to grow, organisations are increasingly distributing their computing ability and network resources closer to where those users and devices are located. By Prenesh Padayachee,...

OT the new feeding ground for cyber-attacks

Before the advent of Industrial Internet of Things (IIoT), operation technology (OT) was safeguarded against most cyberattacks. OT systems’ propriety nature, standards and hard-wired connectivity protected it against malicious attacks. By Johan Potgieter,...

Banks move intruder systems to lithium battery technology

Banks have been challenged with load shedding to keep security systems operational and specifically intruder systems. As the level of load shedding intensified, lead acid batteries which were being used by most banks to run intruder systems, were showing a significant...

Turn your employees into human firewalls

Cyber-security is a term on every businessperson’s mind, as the legal, financial and reputational implications of a breach are massive. The challenge is that, while a company can implement the best cyber-security technologies, the biggest threat to a firm remains its...