Automated data protection critical, says Redstor
Data theft has become automated, widespread and easy - and the situation calls for technology on the same level and just as effective. The theft of data is so prevalent, so orchestrated and serious, it requires technology that is just as quick and equal to the task of...
Incident response vital to business survival
One only has to look at the slew of breaches that have been reported in the last few years to understand that one mistake can cost millions of customers their privacy and bring global consumer trust to an all-time low. This is why having incident response measures in...
Why you need personal cyber insurance
We're living in a connected world. We bank online, we stay in touch with family and friends via social media, and we are even connecting our homes these days. Smart homes promise all sorts of benefits to consumers, from energy efficiency and control, to entertainment...
Market volatility drives payment protection
South Africa is currently experiencing difficult political and economic conditions, which has a direct impact on the financial and trading performance of businesses. Vulnerabilities to external shocks have also increased in a post-downgrade economy, with the impact of...
Predictive analytics and criminal profiling
There is an enormous pool of data, much of it without barriers. The potential to mine data for practical application is now not only possible, but critical as a business driver. Moreover, big data has an important role to play in predictive analysis and its particular...
Predictive analytics for fraud
There is an enormous pool of data, much of it without barriers. The potential to mine data for practical application is now not only possible, but critical as a business driver. Moreover, Big Data has an important role to play in predictive analysis and its particular...
Hetzner breach exposes need for cyber insurance
Last week, one of SA's largest hosting companies, Hetzner, was hacked, exposing hundreds of thousands of FTP passwords, domain names and bank account details, with the exception of credit card information. This has left South African organisations vulnerable to bad...
Aiding mobile device investigations
There's no doubt that mobile phones are ubiquitous. Out of the roughly 7-billion people who share this planet, 6-billion of them have access to mobile phones, and for many, these devices are the sole entry point to the online world. "On the flip side, the growth in...
FirstRand prioritises model risk management
FirstRand needed to gain a single view of model risk across various franchises, segments and geographies, while meeting compliance obligations.Using SAS Model Risk Management it was able to get a full inventory of credit models, gain an epectation to meet all...
Creating effective cybercrime training
Recent statistics released by Vanson Bourne and Mimecast show that less than half of South African companies are completely confident with the staff training they currently have in place to counter email cyber-attacks. As many as 46% only have some confidence and 6%...
Strengthen your security position
The changing face of IT security is seen in such factors of modern life as the pervasiveness of the Internet, the sheer abundance of mobile devices, the rise of social media, and dramatic shifts in web and cloud-based technology. The Internet of Things (IoT) adds...
Cyber insurance and availability make good bedfellows
With attacks like WannaCry and Petya infecting hundreds of thousands of computers worldwide, many are calling this the Year of Ransomware. Its increased level of threat sophistication and maturity clearly show that even though traditional methods of data protection...