How cybercriminals hide in your phone
While analysts figure out new methodologies for analysing malware and users begin to understand how all this works, cybercriminals are seeking new ways to hide in phones and compromise devices, says ESET Southern Africa. The convoluted tricks used to increase the...
Trends transforming the local security landscape
The South African security industry has been described as cutting-edge, comprising a number of segments from physical- to cybersecurity. The sector boasts a current growth rate of around 15% per annum, and is estimated (in its entirety, including commercial, industry...
Kaspersky Lab clinches AV-Test triple crown
Kaspersky Lab products have won awards in three different categories following the latest tests carried out by independent IT security institute AV-Test. Kaspersky Lab's small business, endpoint security and internet security solutions all triumphed, highlighting the...
Risks and rewards of meshing physical, cyber security
Security is undoubtedly a primary focus for any organisation, particularly in this digital age where assets extend beyond the physical to include virtual assets such as data. By Sanjay Vaid, practice director cyber risk security at Wipro The emergence of cloud or...
SearchInform partners with Condyn
SearchInform, a Russian developer of information security systems - has entered the South African market. The Russian company has signed a partnership agreement with Condyn, a local provider of information and security solutions located in Centurion. Condyn will...
Sofacy shifts focus to include Far East
Kaspersky Lab researchers have observed that the Russian-speaking threat actor Sofacy, also known as APT28 or Fancy Bear is shifting its target to the Far East, with a strong interest in military, defense and diplomatic organisations - in addition to its traditional...
Cloud’s biggest security risk: the user
Cloud is coming into its own. Forrester says that public cloud platforms, business services, and applications will reach $236-billion by 2020. With cloud spending predicted to be six times that of IT spending over the same period, a cloud strategy is how companies...
Fortinet delivers third-generation network security
Fortinet has announced the evolution of its Security Fabric architecture with the release of FortiOS 6.0, which it claims is the world's most deployed network security operating system. With more than 200 new features and capabilities, enterprises will benefit from...
Safe as houses?
Information is an organisation's most valuable asset. To protect that asset, it's no longer viable that security is an external layer of core information management software. Security should be imbedded in the foundation of the software's design. It is integral to the...
Why you should protect data at all costs
It has long been said that 'knowledge is power' but never has that been more pertinent than it is for businesses today. What businesses know is a key differentiator as they seek to get closer to their customers and improve their own business processes through the...
Velocity Group adds Check Point
The Velocity Group is adding Check Point Software Technologies, a leading provider of cybersecurity solutions globally, to its growing list of vendors, providing local customers access to the superior security solutions within the Check Point portfolio. The...
What you need to know about IoT attacks
Something major happened in 2017. Internet of Things (IoT) devices were exploited by cybercriminals and turned into a rogue and malevolent army. A series of distributed denial of service (DDoS) attacks affected websites connected to the cloud-based internet...