Cyber threats to escalate in 2019
South Africa is no stranger to data breaches, with databases of blue-chip companies such as Ster-Kinekor, ViewFines and Masters Deeds having been targeted in the recent past - often with staggering consequences for the companies and their clients. Doug Clare,...
Email security does not end with your password
Email is a crucial part of most people's daily lives, but few people consider how it's secured, apart from entering a password to access our accounts. What options are available or even advisable to use for securing email, asks Carey van Vlaanderen, CEO at ESET...
Cybercrime trends and financial services
The same concept holds true for cybercrime and the Financial Services industry. At the end of the day, regardless of who the ultimate victim of a cyberattack is, the end goal of most cyber events continues to be financial gain. By Doros Hadjizenonos, regional sales...
Create a cybersecurity culture
'Cybersecurity' is still a relatively new word, making its first appearance to reference "protecting a computer or computer system" in 1989. Since then, the term has evolved to incorporate every aspect of IT, information and cyber security. By Simeon Tassev, MD and...
Gemalto simplifies IoT connectivity
Gemalto is helping simplify and secure IoT connectivity for AT&T customers by integrating its embedded SIM (eSIM) inside the Cinterion LTE-M IoT module. The new solution streamlines development for OEMs and reduces the cost and complexity of IoT deployment by...
Are we prepared for 2019’s cyber security challenges?
"Technology is a queer thing. It brings you great gifts with one hand, and it stabs you in the back with the other," wrote novelist and scientist CP Snow in the New York Times in 1971. It still rings true today. Every new tool or technology we use introduces new...
Will Chrome update stop online ad abuse?
Google has taken another positive step toward making the Internet a safer place with the launch of Chrome 71. By Grant Hamilton, Check Point country manager South Africa Building on the ad-blocking measures introduced in Chrome 64 and 68, which prevented sites from...
Check Point named IDC MarketScape leader
Check Point Software Technologies has been named as leader in the IDC MarketScape: Worldwide Mobile Threat Management Software 2018-2019 Vendor Assessment. It is the second-consecutive year Check Point was named a leader in this category with its SandBlast Mobile...
Security challenges in the multi-cloud
The cloud argument has been settled and there is no doubt on the minds of the CIO and IT in general that the cloud is now just an extension of one's infrastructure. The current debate on the table is the adoption of a multi- or dispersed-cloud approach - and what this...
Collaboration key to protecting critical infrastructure
National power grids are increasingly becoming a target of hackers and attacks. Several hacks have been reported across the globe in recent years, drawing the world's attention to the vulnerability of national power supply systems, and bringing into question the...
What’s causing today’s IT security gap?
What's stopping global businesses from protecting their assets despite significant investments in cyber security programmes? That's the question we asked ourselves when trying to determine what the reasons are behind the dangerous gap in modern IT security. By Simon...
DarkVishnya cyber-robberies hit Eastern Europe
During 2017 and 2018, Kaspersky Lab experts were involved in incident response following a number of cyber-robberies targeting financial organisations in Eastern Europe. The researchers discovered that in each case the corporate network was breached through an unknown...