Free online webinar on cybersecurity
Large scale ransomware attacks and data breaches have dominated the news recently. "It is clear from these cybersecurity incidents that traditional methods of protection are no longer enough to prevent attacks" says Jeremy Matthews, regional manager of Panda Security...
Gemalto, Entrust Datacard extend partnership
Gemalto and trusted identity and secure transaction technology solutions provider Entrust Datacard have expanded their longstanding partnership to include a secure framework for Internet-connected devices. The new collaboration and integration will allow customers to...
ThisIsMe expands security solution
Identity verification specialist ThisIsMe has expanded its product offering with new products aimed at reducing business risk. They include; PEP (Politically Exposed Persons), Sanctions, Adverse Media Screening, Deeds Check service, Company Lookup and the ultimate KYC...
We all need 21st century data security
Technology created and widely adopted in the 21st century has undoubtedly made our lives easier. It means everyday activities like banking are far less tedious and time-consuming, and that complex, more specialised tasks, like managing a company's finances, are...
SA’s growing cyber threats
Graham Croock, director of BDO IT Advisory Services, gives his opinion on the state of the cyber-security industry in South Africa. During my visit to BDO Norway last week, where I attended a tour of the BDO CERT facility, to personally see the operation of SOC...
Network security 101
The news these days is awash with stories about cyber-attacks and network security. While cybercrime has been around as long as the Internet has, the frequency and sophistication of attacks increase daily. This is not a fad or trend. It is the stark reality facing all...
Finding the imposters among us
The cybersecurity industry's approach to protecting our data simply isn't working anymore. It was built for the past. It was about outside threats, hackers finding their way inside, building bigger and more audacious security walls to befuddle the bad guys and protect...
Security at the heart of successful transformation
Kathy Gibson is at Dell EMC Partner Summit in Cape Town – Every organisation has security at top of mind, and CIOs are grappling with the challenge of implementing digital transformation while keeping it secure. Hein Kern, who looks after the RSA business in South...
Gemalto helps companies gain data insights
Gemalto today announced the launch of Sentinel Up, an enterprise-grade software update solution for software vendors and device manufacturers. Designed to help businesses improve customer satisfaction and drive business growth, Sentinel Up allows vendors to deliver...
Data protection to the fore
Kathy Gibson is at Dell EMC Partner Summit in Cape Town – In the era of digitalisation, with data becoming more pervasive than ever before, it is key to ensure that data is protected. The problem, says Servaas Venter, DPS sales lead at Dell EMC, is compounded by the...
SA a breeding ground for cyber attacks
As markets in fast growing economies race to join the digital revolution they are fast being hijacked by cybercriminals, who are preying on security vulnerabilities in some fledgling IT environments. By Keith Matthews, country manager: South Africa at Orange Business...
The alarming disadvantages of home security systems
Traditional home alarm systems started appearing on the consumer market in the 1980s-1990s. At that time, they were an advance in security technology. They had motion detection, cameras and very few visible wires. They made homeowners feel more secure. But fast...