An intelligent solution for security skills
It's no secret that we're currently faced with a global information security skills crisis, writes Simeon Tassev, MD and QSA of Galix Networking. Given that the predicted increase in demand for information security professionals is exceeding the current rate of supply...
Security transitions to all-digital solutions
If your goal is to have all-digital security in just five years, Eckart Zollner, head of business development at the Jasco Group, says there is a smart way to do it. There are a lot of analogue CCTV solutions out there - they account for over 60% of the current...
Proactively defend your network
Cyber attacks occur with increasing speed and sophistication. Advanced persistent threats (APTs) that are tailored to infiltrate a network and target specific information are a reality, and are only going to become more pervasive. In today's world of the Internet of...
Learn, segment and protect in the IoT world
Experts predict that by 2020 there will be 4,3 Internet-connected devices for every man, woman, and child on the planet. Each of these connected devices generates data that is pushed, pulled, collected, sorted, analysed, stored, and examined. This data, and the...
IoT becomes Internet of threats
The proliferation of Internet of Things (IoT0 endpoints, including smart appliances and wearables, is presenting a significant threat to organisations, says Fortinet. Addressing a roundtable briefing on IoT threats in Johannesburg, Paul Williams, country manager:...
How to ruin a cybercriminal’s day
Technology has changed the way we live, our relationships with others, and even how we take care of ourselves. These days, everyone - from the most inexperienced to the most advanced user - takes measures to protect themselves from cybercriminals seeking to compromise...
Trends that affect IT asset disposal
Smartphone technology is evolving rapidly, there have been vast improvements over the past few years and it is certainly not slowing down. The rise of smartphone technology continues to shape the way we live, work and play. Mobility has grown enormously with the...
The hunt for the dawn of APTs
The Moonlight Maze cyber-espionage attacks sent shockwaves through the US in the late 1990s - two decades later, researchers uncover the original attack tools and find a link to a modern APT. Kaspersky Lab and Kings College London researchers, looking for a link...
Ransomware is not only file encryption
Ransomware is an ever-increasing threat worldwide, claiming new victims on a regular basis with no end in sight. The Check Point threat intelligence teams unpacks the issue. While most ransomware families prevent the victims from accessing their documents, pictures,...
A decade of staying ahead of the security
Celebrating its tenth anniversary, SID's David Liu looks back over the last decade and gives insight into the changes in the online security sector. What were you doing 10 years ago? Well, if you are South African, chances are you were listening to Rihanna's Umbrella,...
Companies need the unabbreviated truth about IT security
Information systems change all the time. Couple this with the fact that new threats arise constantly and it's easy to see why security systems implemented or updated last month can't keep pace with security requirements right now. The truth is that securing an IT...
FLIR visual kits from Graphic Image Technologies
A new IP video surveillance system usually requires that the security specialist or installer purchases all components individually before undertaking the process of device installation and infrastructure implementation. This can be time-consuming, costly and...