Embrace the breach, rethink the threat landscape
The app is no longer fixed in one location. Where the app goes, so too should protection, says Martin Walshaw, senior engineer at F5 Networks . Applications are the gateway to our data. Whether at work or in the home, the way we manage private information is critical...
Kenya cyber attacks growing in sophistication
It '' s not only the frequency of the cyber attacks happening in Kenya at the moment, but also the size and sophistication of these assaults that government and business need to face up to. The hacking of Kenya '' s government in November 2016 has highlighted the...
Protect your online identity
TrackOFF, a consumer privacy company that builds best-in-class tools to secure users' identities and personal data, has launched in South Africa and now offers a localised service to citizens. The local service, available immediately, combats tracking technology, such...
Tighten up security this festive season
With so many homes and businesses left vacant during the festive season, a Western Cape Business Woman is urging people to make use of technology to assist in protecting their properties while away. "Any incidents at home is the last thing you want to come back to...
Become more cyber savvy and secure online
For the everyday internet user, becoming more cyber savvy is vital. Just as we invest in personal security and keep our wits about us as we move around, so too must we be alert to threats online. Fortunately, becoming more better informed and protecting our online...
Protect IP video systems from summer storms
The majority of all surge-induced damage to IP video cameras and equipment is caused by surges travelling along unprotected data and power lines. Marc van Jaarsveldt, consultant at The Surveillance Factory, says these surges originate from static charge build-up,...
Top tips for protecting your business
Modern business increasingly relies on network-supported technologies, such as cloud computing, mobility and the Internet-of-things (IoT), writes Mark McCallum, chief technology officer of Orange Business Services. The flexibility and agility they offer are essential...
Prevent ransomware – and what to do if you can’t
Ransomware - a type of malware that locks a victim's computer or decrypts their data, demanding them to pay a ransom in order to regain control over the affected device or files - is one of the fastest-growing types of cybercrime, writes Trevor Coetzee, regional...
GIT lauches FLIR’s FC-Series ID thermal cameras
Graphic Image Technologies (GIT), in conjunction with FLIR Systems, has announced the local availability of the FC-Series ID thermal security cameras, the latest models in its FC-Series line. The FC-Series ID thermal cameras combine built-in analytics for high...
ESET debuts early warning service
ESET is to offer ESET Threat Intelligence, a service that predicts and proactively notifies customers of real-time threats targeting their businesses so they can be more flexible when adapting to a rapidly changing threat landscape. The service will be rolled out...
Don’t just hand over personal information
South Africans are all too trusting when it comes to their personal information, and that can be dangerous. Sarel Lamprecht, MD of leading cyber insurance company Phishield, says that very few South Africans realise that when they hand over their ID cards for scanning...
DDoS application attacks: what you need to know
The best defence is a multi-layered one, covering the application and the network, says Martin Walshaw, senior engineer at F5 Networks. DDoS attacks are evolving. They are no longer simply a nuisance - they are highly-funded and highly-targeted. Anyone can launch a...