Security terminology demystified: ransomware edition
The file scrambler, the data hoarder and the ransom demander – ransomware isn’t fun for anyone. You’ve read our comprehensive guide to cybersecurity threats and you’ve hopefully read our inside guide to malware but now it is time to delve deep into the underground...
Kaspersky Endpoint Security Cloud now in two tiers
Kaspersky Lab has launched a new edition of Kaspersky Endpoint Security Cloud -- a cloud-based cybersecurity product for small and medium-sized businesses that seek easy security management and benefit from cloud services. Now available in two tiers, the product...
SearchInform road show an SA success
SearchInform, together with South African partners Condyn and Secnovate, held an Insider Risk and Fraud Executive Briefing 2019 in Johannesburg and Cape Town. The speakers introduced the original concept based on a holistic approach to human-related threats...
Explosion-protected network cameras reduce health, safety, environmental risks
Axis Communications has announced the release and local availability of three new cameras in its ExCam XF range. The explosion-protected network cameras have been designed for industrial environments where a customer's first concerns are the safety of employees and...
PTZ network camera for harsh environments
Axis Communications has launched the AXIS Q6215-LE PTZ Network Camera in South Africa to meet the increasing demand for more heavy-duty PTZ cameras with built-in IR (Infrared) illumination. The new model comes with a 1/2-inch sensor and combines great image quality...
SneakyPastes: hits Middle East related targets in 39 countries
In 2018, the Gaza Cybergang, now known to comprise several groups of varying sophistication, launched a cyberespionage operation targeting individuals and organisations with a Middle-Eastern political interest. The campaign, named SneakyPastes, made use of disposable...
Workonline deploys RPKI-based BGP Origin Validation
Workonline Communications has become the first African wholesale IP transit provider to deploy Resource Public Key Infrastructure (RPKI) Origin Validation (OV) to improve the security of Internet routing around the world. A specialised public key infrastructure (PKI)...
Intentionally insecure: poor security practices in the cloud
So far this year, there have been five documented cases of organisations exposing their private data due to misconfigured S3 buckets or cloud databases. By Lori MacVittie, principal threat evangelist at F5 Networks Wait, let's fix that: due to intentionally configured...
Trend simplifies security for Microsoft Azure environments
Trend Micro has announced the availability of highly optimised security solutions for Microsoft Azure workloads for its customers in sub-Sahara. The Trend Micro Deep Security suite takes into consideration that a customer needs to approach cloud security differently...
Autonomous IT, security solutions enable proactive IT
The cybersecurity of a business is still largely reliant on the people within each company's IT department. This is not sustainable long-term and organisations need to start looking to autonomous security measures to relieve some of the pressure felt by IT teams. By...
Trend Micro extends security offerings
Trend Micro has announced enhancements to its Deep Security and Cloud App Security products designed to extend protection to virtual machines on the Google Cloud Platform, Kubernetes platform protection, container image scanning integration with the Google Kubernetes...
Securing the Industrial Internet of Things
The very benefits that makes the Industrial Internet of Things (IIoT) so compelling, makes it equally capable of damaging infrastructure operations and processes through bad actors. Beginning with the Industrial Revolution in the mid 1700s, the manufacturing industry...