Digital forensics crucial to the security chain
The past decade has seen developments in technology that were previously unimagined. Businesses around the globe are increasingly reliant on the Internet and other technologies that keep them connected to their customers, supply chains and crucial business...
How CISOs can maintain corporate privacy
Today's workforce is increasingly comprised of millennials and other tech-savvy individuals that are accustomed to using technology in every aspect of their lives. By Doros Hadjizenonos, regional sales director at Fortinet in South Africa As new technology emerges,...
The best way to do endpoint detection and response
Endpoint protection is one of the primary considerations for cybersecurity. By Indi Siriniwasa, vice-president: sub-Saharan Africa at Trend Micro There was a time when on-premise desktop computers were the only thing that had to be secured. However, BYOD and...
Build a first line of defense with Kaspersky Web Traffic Security
In 2017, almost one-in-three1 network users - including corporates - were attacked by web threats. Consequently, it is no surprise that reducing potentially risky online actions of employees remains a challenge for 50% of businesses. To help address this, Kaspersky...
J2 Software launches Home Secure
J2 Software has announced the launch of J2 Home Secure, aimed at protecting home/personal users from online fraud and cyber threats. John Mc Loughlin, CEO of J2 Software, says there is a growing trend in online fraud targeting consumers which includes: invoice fraud,...
DDoS attacks demand different defence strategies
Despite the fact that firewalls, IPS and load balancers are some of the least effective mitigation measures against distributed denial of service (DDoS) attacks, they remain at the top of the list of security measures that organisations have said they plan to employ...
What is fileless malware?
Fileless malware has become a significant threat, and what makes this kind of malware particularly nasty is how difficult it is to detect. By Indi Siriniwasa, vice-president of Trend Micro SSA Because these attacks are so sneaky and hard to find, it makes the malware...
Kaspersky Lab moves to secure cryptocurrency exchanges
The role of cryptocurrencies in online financial transactions is growing rapidly - not only for investors, but also for cyber-criminals, who have netted nearly $10-million using fraudulent schemes in the last year. To safeguard the evolution from a constantly...
Why the CIOs/CISO positions is becoming more challenging
CIOs and CISO's across industries are regularly moving between positions and companies because of this common mistake, writes Pieter Engelbrecht, Aruba BU manager for sub-Saharan Africa. It's your worst possible nightmare. A hacker has breached the company's network...
Blue Label offers new ExtraHop Reveal(x)
Blue Label Technology Solutions has announced the availability of ExtraHop Reveal(x) Summer 2018 in South Africa, a new release which highlights late stage cyber-attack activities and significantly reduces 'dwell' time. Between 2017 and 2018, threat dwell time in the...
Email security essential in the digital age
A relationship that began many years ago with the migration of the Syrex secure email gateway services to Mimecast has evolved into a partnership for the future as companies need to become increasingly cyber resilient to protect themselves against malicious email...
Kaspersky Lab helps build skilled capacity with SABRIC
Kaspersky Lab concluded a memorandum of understanding (MOU) signed with the South African Banking Risk Information Centre (SABRIC) in October 2017 and plans to renew the MOU for a further year, following its success. The MOU has seen Kaspersky Lab successfully support...