Gemalto, R3 pilot blockchain for digital ID
Who are you, and can you prove it? The new Gemalto Trust ID Network enables users to give digital service providers fully verified and secured answers to these simple yet critical questions. By creating and managing their own 'Self-Sovereign' Digital ID, users can...
Email hackers defeated by AI
Email is a regular method of attack for the cybercriminal because it is the easiest and most successful way to spread high-risk threats. This makes it one of the most popular vectors in a hacker's arsenal. The thing with hacking an email account is that the hacked...
What Nigerian children do online
Kaspersky Lab has revealed the online activities of children across Nigeria, based on statistics from the company's Parental Control modules. The research has revealed what children in the region watched, listened to, purchased and searched for online. The report...
Kaspersky Lab launches cybersecurity contest
Kaspersky Lab has launched a new cybersecurity contest called 'Secur'IT CUP' which invites students and young professionals aged from 18 to 28 from all over the world to participate in solving cybersecurity cases, as individuals or in teams. Participants will be asked...
KYC models need to upgrade
Know Your Customer (KYC) and anti-money laundering approaches will need a complete overhaul to cope with the wave of digital change, the mainstreaming of blockchain technology and efforts to bank 2-billion unbanked people, says Ideco. Know your customer (KYC) and...
Take a human centric approach to security
Every time the details of a new security breach hits the headlines, something is made clear: Security tools and solutions aren’t working. Yet businesses continue to throw more and more money and technology at the problem. It’s time to look at the human factor, which...
Paranoia and personas to secure IoT
The low-cost, low-power nature of the IoT can cause security considerations to be deferred till much later in the product implementation stage, or sometimes, indefinitely. By Sherry Zameer senior vice-president: IoT at Gemalto However to realize IoT's true potential,...
IT security: oxygen or onion?
Security is as vital to organisational success as technology and people. By Mark Walker, associate vice-president: sub-Saharan Africa at International Data Corporation (IDC) Search for security on Google. The engine will autofill with - security is like oxygen and...
Modern KPIs for effective cybersecurity
Faced with increasingly frequent and sophisticated cyber-attacks, enterprises are scrambling to put technologies and processes in place to effectively detect and combat cyber risks. By Martin Potgieter, technical director at Nclose Research by Symantec found that...
Turning cyber threat into cyber opportunity
The network of connected sensors, devices, and appliances commonly referred to as the Internet of Things (IoT) has completely changed the way business works. This is as true of the heavy hauling and freight industry as any other. At any moment, various players in the...
Striata inks partnership with UK-based Communisis
Striata, a digital communications and document security specialist, has inked a partnership deal with UK-based customer communications specialist Communisis. As a result of the partnership, the two companies have created an integrated solution that helps companies in...
Panda Dome offers adaptive security
Panda Security, has simplified its solution offering bringing together its product range with new Panda Dome. Thw 100% customisable platform adapts to users changing needs in order to protect them against advanced threats. Panda Dome provides a resilient yet flexible...