Prevention is always better than cure
Every data breach that rocks the headlines seems to get worse. The fines get bigger, the damage to reputation more severe. More than one share price has plummeted in the aftermath of a data breach. Should a data breach occur, there are multiple issues a business has...
Sophos in Gartner’s 2018 UTM Magic Quadrant
Sophos has once again been positioned in the "Leaders" quadrant of Gartner's 18 September 2018, "Magic Quadrant for Unified Threat Management (SMB Multifunction Firewalls)". As one of only three vendors positioned as a leader, Sophos is positioned furthest for...
Bitdefender adds online crime defences
Bitdefender's new 2019 consumer security product line includes Network Threat Prevention, providing in-depth monitoring of systems, searching for avenues of attack to prevent exploitation of vulnerabilities. Network Threat Prevention also detects, and blocks...
Full-spectrum security in a complex world
Kathy Gibson is at Gartner Symposium in Cape Town – Digital and workforce transformation are underpinned by IT and security transformation. Many of the trends we are seeing are driven by a massive increase in data, says Servaas Venter, director: data protection...
Gemalto, R3 pilot blockchain for digital ID
Who are you, and can you prove it? The new Gemalto Trust ID Network enables users to give digital service providers fully verified and secured answers to these simple yet critical questions. By creating and managing their own 'Self-Sovereign' Digital ID, users can...
Email hackers defeated by AI
Email is a regular method of attack for the cybercriminal because it is the easiest and most successful way to spread high-risk threats. This makes it one of the most popular vectors in a hacker's arsenal. The thing with hacking an email account is that the hacked...
What Nigerian children do online
Kaspersky Lab has revealed the online activities of children across Nigeria, based on statistics from the company's Parental Control modules. The research has revealed what children in the region watched, listened to, purchased and searched for online. The report...
Kaspersky Lab launches cybersecurity contest
Kaspersky Lab has launched a new cybersecurity contest called 'Secur'IT CUP' which invites students and young professionals aged from 18 to 28 from all over the world to participate in solving cybersecurity cases, as individuals or in teams. Participants will be asked...
KYC models need to upgrade
Know Your Customer (KYC) and anti-money laundering approaches will need a complete overhaul to cope with the wave of digital change, the mainstreaming of blockchain technology and efforts to bank 2-billion unbanked people, says Ideco. Know your customer (KYC) and...
Take a human centric approach to security
Every time the details of a new security breach hits the headlines, something is made clear: Security tools and solutions aren’t working. Yet businesses continue to throw more and more money and technology at the problem. It’s time to look at the human factor, which...
Paranoia and personas to secure IoT
The low-cost, low-power nature of the IoT can cause security considerations to be deferred till much later in the product implementation stage, or sometimes, indefinitely. By Sherry Zameer senior vice-president: IoT at Gemalto However to realize IoT's true potential,...
IT security: oxygen or onion?
Security is as vital to organisational success as technology and people. By Mark Walker, associate vice-president: sub-Saharan Africa at International Data Corporation (IDC) Search for security on Google. The engine will autofill with - security is like oxygen and...