Two-factor authentication should be a staple
The tools for two-factor authentication have been available for about a decade and in an era of increasing cyber crime, fraud and identity theft, two layers of authentication at least should be a staple for security. But it is not. While some are already graduating to...
Use Computer Security Day to strengthen resilience
All organisations should use Computer Security Day on 30 November 2017 as an opportunity to improve their ability to recover from disaster. This is according to Padma Naidoo, head: advisory services at ContinuitySA, who adds: "Computer Security Day was inaugurated in...
Secure the enterprise network with AI
Artificial intelligence (AI) often throws up visions of a futuristic Earth, where self-aware robots are programmed to be ethical in their behaviour and protect human lives at all costs, writes Pieter Engelbrecht, business unit manager for HPE Aruba. It's clear that an...
Cybersecurity is everyone’s business
The future of work very much revolves around the future of security, writes Brendan McAravey, country manager of Citrix South Africa. New ways of working offer exciting opportunities to boost employee productivity, creativity, and engagement, but they can't come at...
Quantum cryptography will be ultra-secure
With an increasingly connected world spurring on the perpetual rise of the Internet of Things (IoT), data is firmly establishing itself as the dominant fuel within many organisations, being central to the way they work, writes Ronald Ravel, director: B2B South Africa...
Identity ecosystem must learn from banks’ example
There are clear parallels between the development of financial services and identity verification ecosystems, but the identity ecosystem has to take urgent steps to catch up with the banking ecosystem. By Marius Coetzee, MD of Ideco The recent high-profile identity...
Encryption, key management for Google customers
Gemalto (Euronext NL0000400653 GTO), the world leader in digital security, today announced it is providing Google Cloud Platform customers with the ability to manage and maintain full control of their encryption keys on Google Cloud Platform. Gemalto's SafeNet Luna...
Samsung tackles IoT data security
Samsung Electronics has introduced its integrated Secure Element (SE) solution for Internet of Things (IoT) applications that offers a turn-key service for hardware and software needs. As the benefits of IoT devices grow, so does the importance of security throughout...
With video surveillance you get what you pay for
When considering a new video surveillance system, it makes sense for companies to get a few quotes from vendors to compare prices. However, what should companies choose, when presented with two different quotes? By Mark Chertkow, MD of Graphic image Technologies...
Do you need up-to-date data protection?
Data is an organisation's most critical, strategic and competitive asset. In order for businesses to remain successful, in it imperative that they protect their data. However, thanks to the proliferation of data-generating devices and technologies such as...
NordVPN debuts proxy extension for Firefox
As VPNs are growing in popularity, many providers are launching user-friendly features and extensions to make more tools accessible to anyone willing to protect their online privacy. NordVPN has just launched another digital security tool: a proxy extension for...
Kaspersky Lab presents online security training
Kaspersky Lab research shows that 44% of businesses in South Africa admit that they don't know enough about the IT security threats targeting them, and it comes as no surprise that they are concerned about becoming cyberattack victims as a result. To help IT teams...