Cyber-security in 2018: the big five
Cyber attacks have become something far greater than an embarrassing nuisance. As businesses are increasingly reliant on digital platforms for almost every aspect of their operations, an attack can cause everything from direct financial loss and brand damage, to...
Combating the seven swords of cybercrime
With automated tools and hackers for hire, cybercrime has turned into a game for profit, writes By Martin Walshaw, senior systems engineer at F5 Networks. Recent research from F5 Labs shows that out of 429 reported breaches studied between 2005 and 2017, hackers...
Meet the hackers …
Over the past year, every company in the world has experienced a mobile malware attack, according to a trends article from Check Point Software Technologies. Mobile malware has become a major concern for both consumers and organisations worldwide. Although much has...
How cybercriminals hide in your phone
While analysts figure out new methodologies for analysing malware and users begin to understand how all this works, cybercriminals are seeking new ways to hide in phones and compromise devices, says ESET Southern Africa. The convoluted tricks used to increase the...
Trends transforming the local security landscape
The South African security industry has been described as cutting-edge, comprising a number of segments from physical- to cybersecurity. The sector boasts a current growth rate of around 15% per annum, and is estimated (in its entirety, including commercial, industry...
Kaspersky Lab clinches AV-Test triple crown
Kaspersky Lab products have won awards in three different categories following the latest tests carried out by independent IT security institute AV-Test. Kaspersky Lab's small business, endpoint security and internet security solutions all triumphed, highlighting the...
Risks and rewards of meshing physical, cyber security
Security is undoubtedly a primary focus for any organisation, particularly in this digital age where assets extend beyond the physical to include virtual assets such as data. By Sanjay Vaid, practice director cyber risk security at Wipro The emergence of cloud or...
SearchInform partners with Condyn
SearchInform, a Russian developer of information security systems - has entered the South African market. The Russian company has signed a partnership agreement with Condyn, a local provider of information and security solutions located in Centurion. Condyn will...
Sofacy shifts focus to include Far East
Kaspersky Lab researchers have observed that the Russian-speaking threat actor Sofacy, also known as APT28 or Fancy Bear is shifting its target to the Far East, with a strong interest in military, defense and diplomatic organisations - in addition to its traditional...
Cloud’s biggest security risk: the user
Cloud is coming into its own. Forrester says that public cloud platforms, business services, and applications will reach $236-billion by 2020. With cloud spending predicted to be six times that of IT spending over the same period, a cloud strategy is how companies...
Fortinet delivers third-generation network security
Fortinet has announced the evolution of its Security Fabric architecture with the release of FortiOS 6.0, which it claims is the world's most deployed network security operating system. With more than 200 new features and capabilities, enterprises will benefit from...
Safe as houses?
Information is an organisation's most valuable asset. To protect that asset, it's no longer viable that security is an external layer of core information management software. Security should be imbedded in the foundation of the software's design. It is integral to the...