Risks and rewards of meshing physical, cyber security
Security is undoubtedly a primary focus for any organisation, particularly in this digital age where assets extend beyond the physical to include virtual assets such as data. By Sanjay Vaid, practice director cyber risk security at Wipro The emergence of cloud or...
SearchInform partners with Condyn
SearchInform, a Russian developer of information security systems - has entered the South African market. The Russian company has signed a partnership agreement with Condyn, a local provider of information and security solutions located in Centurion. Condyn will...
Sofacy shifts focus to include Far East
Kaspersky Lab researchers have observed that the Russian-speaking threat actor Sofacy, also known as APT28 or Fancy Bear is shifting its target to the Far East, with a strong interest in military, defense and diplomatic organisations - in addition to its traditional...
Cloud’s biggest security risk: the user
Cloud is coming into its own. Forrester says that public cloud platforms, business services, and applications will reach $236-billion by 2020. With cloud spending predicted to be six times that of IT spending over the same period, a cloud strategy is how companies...
Fortinet delivers third-generation network security
Fortinet has announced the evolution of its Security Fabric architecture with the release of FortiOS 6.0, which it claims is the world's most deployed network security operating system. With more than 200 new features and capabilities, enterprises will benefit from...
Safe as houses?
Information is an organisation's most valuable asset. To protect that asset, it's no longer viable that security is an external layer of core information management software. Security should be imbedded in the foundation of the software's design. It is integral to the...
Why you should protect data at all costs
It has long been said that 'knowledge is power' but never has that been more pertinent than it is for businesses today. What businesses know is a key differentiator as they seek to get closer to their customers and improve their own business processes through the...
Velocity Group adds Check Point
The Velocity Group is adding Check Point Software Technologies, a leading provider of cybersecurity solutions globally, to its growing list of vendors, providing local customers access to the superior security solutions within the Check Point portfolio. The...
What you need to know about IoT attacks
Something major happened in 2017. Internet of Things (IoT) devices were exploited by cybercriminals and turned into a rogue and malevolent army. A series of distributed denial of service (DDoS) attacks affected websites connected to the cloud-based internet...
Kaspersky raises bounty for bugs
Kaspersky Lab is extending its successful bug bounty program to include rewards of up to $100 000 for the discovery and responsible disclosure of severe vulnerabilities in some of its leading products. The opportunity to get this bounty is available to all members of...
Do villains care about biometrics?
Inadequate biometrics systems could be creating a false sense of security in banks, security estates and office blocks, and in effect rolling out a red carpet to criminals. By Marius Coetzee, MD of Ideco. Biometrics-based security devices, in particular fingerprint...
Panda and BDO in strategic partnership
Cyber security firm Panda Security Africa and audit, advisory and tax firm, BDO South Africa, have formed a strategic cyber alliance to enable BDO to offer a managed security service to their clients, using Panda's next generation EDR solution. Predictions for 2018...