The pain of the password
Password breaches are all too common nowadays and the biggest challenge is to keep a different complex password for every website or app, writes John Mc Loughlin, CEO of J2 Software. Most people use the same passwords on multiple sites and, when one of those sites is...
Playing security against productivity: the domino effect
To deliver work quickly, employees often look for ways to cut corners. It's not malicious. It's meant in the spirit of gaining faster time-to-market, increasing brand awareness, meeting end-of-quarter goals, and delivering rapidly in a warp-speed world. We've all seen...
The enemy within as email-borne threats rise
From BA to Equifax, WikiLeaks to GuptaLeaks, Hillary to Ivanka, leaked information as a result of indiscriminate email use or careless employee behaviour is giving organisations and politicians around the world sleepless nights. By Steve Herridge, Mimecast cyber...
How quickly could a cyber attack take down critical infrastructure?
With crucial national infrastructure like power systems and manufacturing currently in the spotlight, stakeholders need to consider the impacts of unseen risks, such as cyber attacks, on operational technology (OT) networks. By Doros Hadjizenonos, regional sales...
Fighting the cyber security threats to African banks
Foregenix is launching a service to combat the new and growing breed of cyber attacks on African banks. The global cyber security firm, which specialises in the financial services and has a regional hub in Johannesburg, is introducing the Foregenix Threat Sweep. Based...
The true value of digital and biometric data
The world of technology advancements has opened us up to several possibilities that were once considered a pipe dream. Although many offer convenience and have positively impacted ample aspects of society, it must be acknowledged that it has also opened us up to...
Tech holds the future of home security
The future of home security will see threats detected and responded to - before a crime can be committed. Making use of big data, home security systems are now able to analyse camera streams and proactively alert armed response service providers. This is a massive...

Your Security: demystifying the terminology
When it comes to security for your home, you understand exactly how it works. You push a button, alarm goes on, criminal enters your property, loud noise goes off and armed services arrive. It’s simple and something every South African understands as easily as...
RF remote controllers: know the potential cyber threats
Industrial manufacturers have come to rely a great deal on radio frequency (RF) protocols in their day-to-day functioning. From simple operations such as turning on a motor to more intricate functions like manoeuvring a heavy-duty vehicle, RF forms an integral part of...
Malicious Emotet trojan doing the rounds
A malevolent new trojan is doing the rounds: Emotet is reported to dwarf the impact of WannaCry and NotPetya which made headlines in 2018 for multimillion dollar losses incurred to businesses across the globe. This is according to Linda Morris of Smart Technology...
Kaspersky helps secure bionic technologies
Kaspersky Lab experts investigating the experimental cloud infrastructure for advanced bionic prostheses have identified several previously unknown security issues that could enable a third party to access, manipulate, steal or even delete the private data and more of...
Next-gen cybersecurity from Sophos Central Management
Sophos has announced that the next-gen Sophos XG Firewall is now available through Sophos Central, bringing Sophos' complete portfolio of cybersecurity solutions into a single, cloud-based management platform. Sophos partners and customers are now able to manage their...