Explosion-protected network cameras reduce health, safety, environmental risks
Axis Communications has announced the release and local availability of three new cameras in its ExCam XF range. The explosion-protected network cameras have been designed for industrial environments where a customer's first concerns are the safety of employees and...
PTZ network camera for harsh environments
Axis Communications has launched the AXIS Q6215-LE PTZ Network Camera in South Africa to meet the increasing demand for more heavy-duty PTZ cameras with built-in IR (Infrared) illumination. The new model comes with a 1/2-inch sensor and combines great image quality...
SneakyPastes: hits Middle East related targets in 39 countries
In 2018, the Gaza Cybergang, now known to comprise several groups of varying sophistication, launched a cyberespionage operation targeting individuals and organisations with a Middle-Eastern political interest. The campaign, named SneakyPastes, made use of disposable...
Workonline deploys RPKI-based BGP Origin Validation
Workonline Communications has become the first African wholesale IP transit provider to deploy Resource Public Key Infrastructure (RPKI) Origin Validation (OV) to improve the security of Internet routing around the world. A specialised public key infrastructure (PKI)...
Intentionally insecure: poor security practices in the cloud
So far this year, there have been five documented cases of organisations exposing their private data due to misconfigured S3 buckets or cloud databases. By Lori MacVittie, principal threat evangelist at F5 Networks Wait, let's fix that: due to intentionally configured...
Trend simplifies security for Microsoft Azure environments
Trend Micro has announced the availability of highly optimised security solutions for Microsoft Azure workloads for its customers in sub-Sahara. The Trend Micro Deep Security suite takes into consideration that a customer needs to approach cloud security differently...
Autonomous IT, security solutions enable proactive IT
The cybersecurity of a business is still largely reliant on the people within each company's IT department. This is not sustainable long-term and organisations need to start looking to autonomous security measures to relieve some of the pressure felt by IT teams. By...
Trend Micro extends security offerings
Trend Micro has announced enhancements to its Deep Security and Cloud App Security products designed to extend protection to virtual machines on the Google Cloud Platform, Kubernetes platform protection, container image scanning integration with the Google Kubernetes...
Securing the Industrial Internet of Things
The very benefits that makes the Industrial Internet of Things (IIoT) so compelling, makes it equally capable of damaging infrastructure operations and processes through bad actors. Beginning with the Industrial Revolution in the mid 1700s, the manufacturing industry...
Assessing impacts: the meteors of security and AI
A 2018 study found that the illicit proceeds of global cybercrime had reached $1,5-trillion annually. Norton Security estimated that by 2023, a total of 33 billion records would be stolen each year. Internet of Things (IoT) attacks increased by 600% and Microsoft...
Digital transformation brings security challenges
As organisations across the board embrace technologies such as the Internet of things (IoT), big data, cloud, and mobility, security becomes more important than ever. But in an era of digital transformation, perimeter security simply cannot be the focus, instead,...
Digital convergence’s impact on OT security
There's an old expression that says, "when it rains it pours." This has never been more true than the current impact of digital transformation on security teams charged with protecting IT and OT networks. By Doros Hadjizenonos, regional director: SADC at Fortinet...