Secure the enterprise network with AI
Artificial intelligence (AI) often throws up visions of a futuristic Earth, where self-aware robots are programmed to be ethical in their behaviour and protect human lives at all costs, writes Pieter Engelbrecht, business unit manager for HPE Aruba. It's clear that an...
Cybersecurity is everyone’s business
The future of work very much revolves around the future of security, writes Brendan McAravey, country manager of Citrix South Africa. New ways of working offer exciting opportunities to boost employee productivity, creativity, and engagement, but they can't come at...
Quantum cryptography will be ultra-secure
With an increasingly connected world spurring on the perpetual rise of the Internet of Things (IoT), data is firmly establishing itself as the dominant fuel within many organisations, being central to the way they work, writes Ronald Ravel, director: B2B South Africa...
Identity ecosystem must learn from banks’ example
There are clear parallels between the development of financial services and identity verification ecosystems, but the identity ecosystem has to take urgent steps to catch up with the banking ecosystem. By Marius Coetzee, MD of Ideco The recent high-profile identity...
Encryption, key management for Google customers
Gemalto (Euronext NL0000400653 GTO), the world leader in digital security, today announced it is providing Google Cloud Platform customers with the ability to manage and maintain full control of their encryption keys on Google Cloud Platform. Gemalto's SafeNet Luna...
Samsung tackles IoT data security
Samsung Electronics has introduced its integrated Secure Element (SE) solution for Internet of Things (IoT) applications that offers a turn-key service for hardware and software needs. As the benefits of IoT devices grow, so does the importance of security throughout...
With video surveillance you get what you pay for
When considering a new video surveillance system, it makes sense for companies to get a few quotes from vendors to compare prices. However, what should companies choose, when presented with two different quotes? By Mark Chertkow, MD of Graphic image Technologies...
Do you need up-to-date data protection?
Data is an organisation's most critical, strategic and competitive asset. In order for businesses to remain successful, in it imperative that they protect their data. However, thanks to the proliferation of data-generating devices and technologies such as...
NordVPN debuts proxy extension for Firefox
As VPNs are growing in popularity, many providers are launching user-friendly features and extensions to make more tools accessible to anyone willing to protect their online privacy. NordVPN has just launched another digital security tool: a proxy extension for...
Kaspersky Lab presents online security training
Kaspersky Lab research shows that 44% of businesses in South Africa admit that they don't know enough about the IT security threats targeting them, and it comes as no surprise that they are concerned about becoming cyberattack victims as a result. To help IT teams...
Bad patch management keeps old exploits in vogue
As much as cybercriminals continue to continue to refine and expand their ways of attacking data and devices, they are also digging into their bags of tried and trusted tricks. Richard Broeke, an IT security specialist and GM at leading managed IT security provider,...
Get smarter with security
When it comes to perimeter protection and security, gone are the days when the cheapest solution would be acceptable. Times have changed and businesses need to keep up to date to protect their valuable assets and people, writes Laurence Smith, executive at Graphic...