Mobile devices: even attacks are getting personal
When it comes to mobile devices, things are getting more personal, including attacks. Contact lists, emails and text messages are just the tip of what people keep on their devices. With banking applications, location histories, social media, photographs, enterprise...
Arbor Netscout partnership offers intelligent security
Arbor Networks, the security division of Netscout, has joined forces with its parent company to offer a unique, intelligent solution in the fight against the advanced threat market. Netscout has announced an integration between its next-generation, real-time...
How to plan for a cybercrime attack
Cyber-crime is on the rise, and given the growing use of technology and the growing volumes of data organisations and individual users face, it is no surprise. By Paul Evans, MD of Redstor Recently, British Airways was struck by an outage that left not one but two...
Credit card fraud exposes need for alternative
A study released in December 2016 estimated it takes around six seconds to hack a credit or debit card. That means working out the card number, expiry date and security code of any debit or credit in the same time it takes to click 'complete purchase'. The research...
Afrimat boosts IT security with J2
Afrimat, an open pit mining company providing industrial minerals and construction materials, has enhanced its security profile through a comprehensive new IT security partnership with ICT firm J2 Software. With a limited IT team in-house, Afrimat has partnered with...
Why hire people to breach your network?
As data breaches become more commonplace, littering the headlines on a daily basis, businesses of all types and across all industries need to work on the assumption that they are a target. Because of this, organisations, especially those who house sensitive, valuable...
Next generation of Kaspersky Private Security Network
Kaspersky Lab is introducing its next generation of Kaspersky Private Security Network, a private version of Kaspersky Security Network that allows enterprises to boost their detection speed with access to real-time global threat intelligence from 80-million sensors,...
Shadow IT could be why businesses “wannacry”
There are mixed opinions about implementing unauthorised, IT applications (apps) within the organisation, a practice known as Shadow IT. Simeon Tassev, MD and QSA at Galix Networking, examines the issue. Opinion on Shadow IT is divided into two camps. Some believe...
Migrating to a digitised environment?
Consider the security risk, urges Simeon Tassev, MD and QSA of Galix. The emergence of the digital world has caused a number of organisations to shift from analogue to digitised environments. Among the many complexities and challenges this transition gives rise to,...
Securing customer communication is best left to experts
Every day, several times a day, customers trust businesses with their personal information. A single transaction can generate reams and reams of data. Identification numbers, physical addresses, phone numbers, bank account details -- a customer parts with all these...
Cybersecurity and the future model
Industry leaders presented a wide range of topics and case studies at the Cyber Security in Banking Conference recently, highlighting the latest trends and development in cyber security. The event offered a comprehensive and multi-facetted agenda relevant to all...
Mission-critical myths about DDoS attacks
Bryan Hamman, Arbor Network's territory manager for sub-Saharan Africa, examines whether these "myths" are fact or fiction. For anyone in 'denial' about the power of Distributed Denial of Service (DDoS) attacks in South Africa - attempts to exhaust the resources...