Is your business getting its priorities right?
If 77% of cyberattacks happen through apps, why do companies spend 90% of their security budget securing the perimeter of their systems? F5 Networks revealed this statistic back in 2016, and yet businesses don't seem to have changed their spending priorities. By...
A cybersecurity checklist for African SMEs
Email is still an organisation's weakest point, with 91% of attacks starting with email-based phishing attacks. And they're not going away. In fact, 90% of global organisations have seen an increase in the volume of phishing attacks in the last year. By Heino Gevers,...
Carbon Black receives five-star customer ratings
Carbon Black customers have given a thumbs-up to the company in a recent Gartner Peer Insights review. Carbon Black, a leader in next-generation endpoint security delivered by the cloud, received 112 five-star ratings from customers in the January 2019 Gartner Peer...
Safer Internet Day: better together
Yesterday was Safer Internet Day - a call for collaboration that comes at a time when corporate privacy scandals, global ransomware epidemics, nation-state attacks and the regrettably fast-expanding cybercriminal world all threaten to tear the internet apart....
A continuous approach to privileged access management
When we think of insider threats, the image that comes to mind is often that of a disgruntled employees looking to cause damage to an organisation. However, these threats are caused by honest mistakes more often than not, says Byron Davel, product manager at Credence...
Old IoT vulnerabilities — a botnet gift that keeps on giving
The first thing anyone purchasing any device that connects to the Internet should do upon switching it on for the first time, is immediately update it. If you don't, you risk having it hijacked by a botnet. So says Bryan Hamman, territory manager for sub-Saharan...
Security implications for 5G and IoT
The advent of 5G networks is about much more than just incredibly fast speeds and more reliable connections, writes Doros Hadjizenonos, regional sales director for Fortinet in South Africa. When combined with today's powerful edge devices -- whether consumer-grade...
Cyber threats to escalate in 2019
South Africa is no stranger to data breaches, with databases of blue-chip companies such as Ster-Kinekor, ViewFines and Masters Deeds having been targeted in the recent past - often with staggering consequences for the companies and their clients. Doug Clare,...
Email security does not end with your password
Email is a crucial part of most people's daily lives, but few people consider how it's secured, apart from entering a password to access our accounts. What options are available or even advisable to use for securing email, asks Carey van Vlaanderen, CEO at ESET...
Cybercrime trends and financial services
The same concept holds true for cybercrime and the Financial Services industry. At the end of the day, regardless of who the ultimate victim of a cyberattack is, the end goal of most cyber events continues to be financial gain. By Doros Hadjizenonos, regional sales...
Create a cybersecurity culture
'Cybersecurity' is still a relatively new word, making its first appearance to reference "protecting a computer or computer system" in 1989. Since then, the term has evolved to incorporate every aspect of IT, information and cyber security. By Simeon Tassev, MD and...
Gemalto simplifies IoT connectivity
Gemalto is helping simplify and secure IoT connectivity for AT&T customers by integrating its embedded SIM (eSIM) inside the Cinterion LTE-M IoT module. The new solution streamlines development for OEMs and reduces the cost and complexity of IoT deployment by...