Predictive analytics and criminal profiling
There is an enormous pool of data, much of it without barriers. The potential to mine data for practical application is now not only possible, but critical as a business driver. Moreover, big data has an important role to play in predictive analysis and its particular...
Predictive analytics for fraud
There is an enormous pool of data, much of it without barriers. The potential to mine data for practical application is now not only possible, but critical as a business driver. Moreover, Big Data has an important role to play in predictive analysis and its particular...
Hetzner breach exposes need for cyber insurance
Last week, one of SA's largest hosting companies, Hetzner, was hacked, exposing hundreds of thousands of FTP passwords, domain names and bank account details, with the exception of credit card information. This has left South African organisations vulnerable to bad...
Aiding mobile device investigations
There's no doubt that mobile phones are ubiquitous. Out of the roughly 7-billion people who share this planet, 6-billion of them have access to mobile phones, and for many, these devices are the sole entry point to the online world. "On the flip side, the growth in...
FirstRand prioritises model risk management
FirstRand needed to gain a single view of model risk across various franchises, segments and geographies, while meeting compliance obligations.Using SAS Model Risk Management it was able to get a full inventory of credit models, gain an epectation to meet all...
Creating effective cybercrime training
Recent statistics released by Vanson Bourne and Mimecast show that less than half of South African companies are completely confident with the staff training they currently have in place to counter email cyber-attacks. As many as 46% only have some confidence and 6%...
Strengthen your security position
The changing face of IT security is seen in such factors of modern life as the pervasiveness of the Internet, the sheer abundance of mobile devices, the rise of social media, and dramatic shifts in web and cloud-based technology. The Internet of Things (IoT) adds...
Cyber insurance and availability make good bedfellows
With attacks like WannaCry and Petya infecting hundreds of thousands of computers worldwide, many are calling this the Year of Ransomware. Its increased level of threat sophistication and maturity clearly show that even though traditional methods of data protection...
King Price launches cyber-insurance
Most people know whether they have insurance for their stuff, car accidents and theft, and liability, but do they know if they're covered for cybercrime? Cybercrime is real, and it's on the increase. In South Africa, 84% of adults who're online have already been...
Availability in the age of security risk
With ransomware attacks becoming increasingly prevalent, companies are more aware than ever for the need for effective cybersecurity measures. But despite this, not enough is being done to ensure the availability of data in the event of systems being compromised,...
The case for cyber insurance
South Africa has not come through recent cyber-attacks unscathed. When cyber criminals breach a network, it's done with the malicious intent of gathering data: medical records, personal information, ID numbers and account details. The propensity and magnitude of...
Tips for selling to CISOs
Selling cyber security products and services is challenging at the best of times. Security, even though it is understood to be essential, tends to be a grudge purchase for most businesses. "Security is aimed at preventing a business from falling victim to a breach or...