Learn, segment and protect in the IoT world
Experts predict that by 2020 there will be 4,3 Internet-connected devices for every man, woman, and child on the planet. Each of these connected devices generates data that is pushed, pulled, collected, sorted, analysed, stored, and examined. This data, and the...
IoT becomes Internet of threats
The proliferation of Internet of Things (IoT0 endpoints, including smart appliances and wearables, is presenting a significant threat to organisations, says Fortinet. Addressing a roundtable briefing on IoT threats in Johannesburg, Paul Williams, country manager:...
How to ruin a cybercriminal’s day
Technology has changed the way we live, our relationships with others, and even how we take care of ourselves. These days, everyone - from the most inexperienced to the most advanced user - takes measures to protect themselves from cybercriminals seeking to compromise...
Trends that affect IT asset disposal
Smartphone technology is evolving rapidly, there have been vast improvements over the past few years and it is certainly not slowing down. The rise of smartphone technology continues to shape the way we live, work and play. Mobility has grown enormously with the...
The hunt for the dawn of APTs
The Moonlight Maze cyber-espionage attacks sent shockwaves through the US in the late 1990s - two decades later, researchers uncover the original attack tools and find a link to a modern APT. Kaspersky Lab and Kings College London researchers, looking for a link...
Ransomware is not only file encryption
Ransomware is an ever-increasing threat worldwide, claiming new victims on a regular basis with no end in sight. The Check Point threat intelligence teams unpacks the issue. While most ransomware families prevent the victims from accessing their documents, pictures,...
A decade of staying ahead of the security
Celebrating its tenth anniversary, SID's David Liu looks back over the last decade and gives insight into the changes in the online security sector. What were you doing 10 years ago? Well, if you are South African, chances are you were listening to Rihanna's Umbrella,...
Companies need the unabbreviated truth about IT security
Information systems change all the time. Couple this with the fact that new threats arise constantly and it's easy to see why security systems implemented or updated last month can't keep pace with security requirements right now. The truth is that securing an IT...
FLIR visual kits from Graphic Image Technologies
A new IP video surveillance system usually requires that the security specialist or installer purchases all components individually before undertaking the process of device installation and infrastructure implementation. This can be time-consuming, costly and...
Data breaches are a part of doing business
Data has become the lifeblood of modern life as everything from room temperatures and health records to banking details and WhatsApp messages are collected and stored. The rapid digital transformation of businesses and services has created an unprecedented amount of...
Data ransoms are crippling businesses
Cyber criminals are always on the prowl, analysing online behaviour of users and looking for new opportunities to infect computers. Ransomware is the latest malicious threat that infects computers and blocks access to data until a ransom is paid. One Channel CEO...
How we’re going to win the war on cyber crime
The time has come for the global cyber security community to combine forces and take the fight to cyber criminals. It's no secret that hackers have been sharing information for a long time, says Doros Hadjizenonos, country manager f Check Point South Africa. Greater...