How to avoid being the next data breach headline
Arcserve Southern Africa cautions local businesses to take a proactive approach to business continuity and data recovery (BCDR) or risk becoming the next data breach headline. "In today's digital world, the issues of data privacy and data security are sources of...
Digital identity question takes centre stage
"On the Internet, nobody knows you're a dog." If you've been around long enough, you've probably run into this famous comic on the net, which sums up the question of digital identity perfectly, writes Lee Naik a tech expert and CEO of TransUnion Africa. Sure, there...
The right information protects from supplier harm
Vetting in the supply chain function enables business to review their suppliers and vendors with the intention of mitigating risk before entering into business relationships. It is an important step in the supply chain, as businesses are vulnerable to a host of...
Cyber Risk 101: What every business needs to know
In our internet-connected society, cybercrime is a very real threat to any business or institution, regardless of size or nature of business that has a network, an internet connection and holds sensitive or personally identifiable data. This is according to Kerry...
There is more to cyber risk than security
Risk experts hold no doubts: the changes technology is bringing to businesses has far-reaching consequences. But the conversation is still split between two poles, those of business and technology. It's more convenient and seems to simplify the issue. But that is not...
Kaspersky CyberTrace streamlines threat intelligence flows
With the number of available threat intelligence sources continuing to grow, a third of CISOs feel under pressure as they cannot consume cybercrime intelligence easily or effectively. To help large companies overcome this challenge, Kaspersky Lab has launched...
How professional investigations have changed
Thirty years ago, South Africa's professional landscape looked completely different to what it is today. The investigations industry has been revolutionised by the advent of auditing firms which conduct internal investigations, and innovative technology that both...
The problem with ageing infrastructure
Outdated IT infrastructure can pose massive problems for businesses. The reality is that many businesses still rely on ageing hardware and outdated software and find it harder to keep up with the swift changes in technology. Another problem with ageing IT...
Supply chain interdependencies demand robust strategies
Business interruption insurance is critical to keep the revenue generating ability of a business intact following an insured event such as a fire, flood or other catastrophic circumstance that can torpedo the financial health of an enterprise. Yet despite its...
Risk, security teams must work together
Businesses across the board are facing an unprecedented range of cyber risks that could have catastrophic consequences. Moreover, there is no 'silver bullet' solution. The common maxim today is that a determined enough attacker will eventually get in. There's also the...
Is digital transformation making us more vulnerable?
Although some organisations still feel that by digitising their businesses, they will be exposing themselves to cyber threats, on the contrary, one of the biggest benefits that forward-thinking organisations are reaping from their digital transformation initiatives,...
A continuous approach to Privileged Access Management
When we think of insider threats, the image that comes to mind is often that of a disgruntled employees looking to cause damage to an organisation. However, these threats are caused by honest mistakes more often than not, says Byron Davel, Product Manager at Credence...