Google Cloud Platform users get Gemalto security
Gemalto providing Google Cloud Platform customers with the ability to manage and maintain full control of their encryption keys on Google Cloud Platform. Gemalto's SafeNet Luna Hardware Security Module (HSM) and SafeNet KeySecure now both fully support Google Cloud's...
A chilling portrait of the cyber-threat landscape
The cybercrime space is advancing so rapidly, it can be a challenge to keep up. Experts from world-leading security vendor, Check Point, provide a detailed look at the current threat landscape and, most importantly, what companies need to know. If when you picture...
ESET, Microsoft help disrupt Gamarue botnets
Security researchers at ESET, in collaboration with Microsoft and law enforcement agencies -- the Federal Bureau of Investigation (FBI), Interpol, Europol, and other stakeholders in cybersecurity -- have taken down a major botnet operation known as Gamarue (detected...
Two-factor authentication should be a staple
The tools for two-factor authentication have been available for about a decade and in an era of increasing cyber crime, fraud and identity theft, two layers of authentication at least should be a staple for security. But it is not. While some are already graduating to...
Use Computer Security Day to strengthen resilience
All organisations should use Computer Security Day on 30 November 2017 as an opportunity to improve their ability to recover from disaster. This is according to Padma Naidoo, head: advisory services at ContinuitySA, who adds: "Computer Security Day was inaugurated in...
Secure the enterprise network with AI
Artificial intelligence (AI) often throws up visions of a futuristic Earth, where self-aware robots are programmed to be ethical in their behaviour and protect human lives at all costs, writes Pieter Engelbrecht, business unit manager for HPE Aruba. It's clear that an...
Cybersecurity is everyone’s business
The future of work very much revolves around the future of security, writes Brendan McAravey, country manager of Citrix South Africa. New ways of working offer exciting opportunities to boost employee productivity, creativity, and engagement, but they can't come at...
Quantum cryptography will be ultra-secure
With an increasingly connected world spurring on the perpetual rise of the Internet of Things (IoT), data is firmly establishing itself as the dominant fuel within many organisations, being central to the way they work, writes Ronald Ravel, director: B2B South Africa...
Identity ecosystem must learn from banks’ example
There are clear parallels between the development of financial services and identity verification ecosystems, but the identity ecosystem has to take urgent steps to catch up with the banking ecosystem. By Marius Coetzee, MD of Ideco The recent high-profile identity...
Encryption, key management for Google customers
Gemalto (Euronext NL0000400653 GTO), the world leader in digital security, today announced it is providing Google Cloud Platform customers with the ability to manage and maintain full control of their encryption keys on Google Cloud Platform. Gemalto's SafeNet Luna...
Samsung tackles IoT data security
Samsung Electronics has introduced its integrated Secure Element (SE) solution for Internet of Things (IoT) applications that offers a turn-key service for hardware and software needs. As the benefits of IoT devices grow, so does the importance of security throughout...
With video surveillance you get what you pay for
When considering a new video surveillance system, it makes sense for companies to get a few quotes from vendors to compare prices. However, what should companies choose, when presented with two different quotes? By Mark Chertkow, MD of Graphic image Technologies...