KYC models need to upgrade
Know Your Customer (KYC) and anti-money laundering approaches will need a complete overhaul to cope with the wave of digital change, the mainstreaming of blockchain technology and efforts to bank 2-billion unbanked people, says Ideco. Know your customer (KYC) and...
Take a human centric approach to security
Every time the details of a new security breach hits the headlines, something is made clear: Security tools and solutions aren’t working. Yet businesses continue to throw more and more money and technology at the problem. It’s time to look at the human factor, which...
Paranoia and personas to secure IoT
The low-cost, low-power nature of the IoT can cause security considerations to be deferred till much later in the product implementation stage, or sometimes, indefinitely. By Sherry Zameer senior vice-president: IoT at Gemalto However to realize IoT's true potential,...
IT security: oxygen or onion?
Security is as vital to organisational success as technology and people. By Mark Walker, associate vice-president: sub-Saharan Africa at International Data Corporation (IDC) Search for security on Google. The engine will autofill with - security is like oxygen and...
Modern KPIs for effective cybersecurity
Faced with increasingly frequent and sophisticated cyber-attacks, enterprises are scrambling to put technologies and processes in place to effectively detect and combat cyber risks. By Martin Potgieter, technical director at Nclose Research by Symantec found that...
Turning cyber threat into cyber opportunity
The network of connected sensors, devices, and appliances commonly referred to as the Internet of Things (IoT) has completely changed the way business works. This is as true of the heavy hauling and freight industry as any other. At any moment, various players in the...
Striata inks partnership with UK-based Communisis
Striata, a digital communications and document security specialist, has inked a partnership deal with UK-based customer communications specialist Communisis. As a result of the partnership, the two companies have created an integrated solution that helps companies in...
Panda Dome offers adaptive security
Panda Security, has simplified its solution offering bringing together its product range with new Panda Dome. Thw 100% customisable platform adapts to users changing needs in order to protect them against advanced threats. Panda Dome provides a resilient yet flexible...
Go phish …
Phishing is one of the oldest cons on the books, and still one of the more popular tools of cyber criminals. Cyber criminals want access to your details and the easiest way to get hold of them is by convincing you that they are someone else - like your bank or a...
PwC launches OT cybersecurity competency
Worldwide, cyber threats have become increasingly sophisticated and complex. As organisations embrace new technologies without fully understanding the implications these may have on the entire enterprise, they are rendering themselves susceptible to an array of...
Preventing network breaches is vital
South Africa has had its share of high profile security breaches. Cyber criminals have targeted prominent businesses such as Ster Kinekor and Master Deeds in 2017, and most recently, Liberty Holdings earlier this year. With GDPR now in effect, companies with...
Who’s responsible for data security in the cloud?
When moving data into the cloud, organisations should be aware that it is the responsibility of the information owner to ensure that holistic protection and clear visibility is in place, to avoid security breaches. Says Riaan Badenhorst, GM of Kaspersky Lab Africa:...