Gemalto boosts cloud security
Gemalto has announced a next-generation key management solution, SafeNet Virtual KeySecure, for simpler and stronger cloud security. Companies can extend their data protection policies to private and public clouds and centralize encryption and key management...
Machine learning takes on spam
Spam: the bane of the user's existence and the cyber criminal's friend. We've all, at some stage, received these unwanted emails advertising products and services we most certainly have no interest in. Early attempts at blocking spam in the early 2000s produced a...
A guide to effective, robust corporate security
There is a heightened sense of cyber security in the corporate world. Companies are now more aware than ever before of the level of risk they are exposed to and the real danger that sophisticated cyber threats pose. Cyber-criminals are using sophisticated tech-driven...
Solutions for when the kids are home alone
What images do you conjure when thinking about your kids being home alone? By Jaime Siminoff, founder and chief inventor at Ring In the 1990 movie, 8-year-old Kevin is accidentally left alone as his family heads to a vacation destination. His mother has a completely...
Free online webinar on cybersecurity
Large scale ransomware attacks and data breaches have dominated the news recently. "It is clear from these cybersecurity incidents that traditional methods of protection are no longer enough to prevent attacks" says Jeremy Matthews, regional manager of Panda Security...
Gemalto, Entrust Datacard extend partnership
Gemalto and trusted identity and secure transaction technology solutions provider Entrust Datacard have expanded their longstanding partnership to include a secure framework for Internet-connected devices. The new collaboration and integration will allow customers to...
ThisIsMe expands security solution
Identity verification specialist ThisIsMe has expanded its product offering with new products aimed at reducing business risk. They include; PEP (Politically Exposed Persons), Sanctions, Adverse Media Screening, Deeds Check service, Company Lookup and the ultimate KYC...
We all need 21st century data security
Technology created and widely adopted in the 21st century has undoubtedly made our lives easier. It means everyday activities like banking are far less tedious and time-consuming, and that complex, more specialised tasks, like managing a company's finances, are...
SA’s growing cyber threats
Graham Croock, director of BDO IT Advisory Services, gives his opinion on the state of the cyber-security industry in South Africa. During my visit to BDO Norway last week, where I attended a tour of the BDO CERT facility, to personally see the operation of SOC...
Network security 101
The news these days is awash with stories about cyber-attacks and network security. While cybercrime has been around as long as the Internet has, the frequency and sophistication of attacks increase daily. This is not a fad or trend. It is the stark reality facing all...
Finding the imposters among us
The cybersecurity industry's approach to protecting our data simply isn't working anymore. It was built for the past. It was about outside threats, hackers finding their way inside, building bigger and more audacious security walls to befuddle the bad guys and protect...
Security at the heart of successful transformation
Kathy Gibson is at Dell EMC Partner Summit in Cape Town – Every organisation has security at top of mind, and CIOs are grappling with the challenge of implementing digital transformation while keeping it secure. Hein Kern, who looks after the RSA business in South...