BDO cyber lab to combat crime
As of June 2015, South Africa was one of only 28 countries in the world with a cybersecurity policy in place. Although a heavily criticised policy, it shows that government recognises the dangers of cybercrime. “We are living in an age where information travels...
High profile data breaches employ phishing
To the average user, phishing emails often appear like harmless requests for information, and seem to come from trusted suppliers, and reputable sources. However, for cyber criminals, phishing is more often than not, the easiest way to get a foot in the door of their...
Samsung, Citrix extend tech partnership
Samsung in collaboration with Citrix XenMobile is to provide the highest level of application and data security for Android environments available on the market today. Citrix XenMobile is an Enterprise Mobility Management (EMM) suite that provides total mobile freedom...
Combatting the ‘evil Internet of Things’
A recent survey of over 400 global IT security pros revealed that fears over the security of connected devices has risen sharply since last year, writes Peter Reid, executive head of Intervate. In all, 86% of respondents to security analysts Pwnie Express’ survey said...
Are contactless cards cloneable?
The security community has been demonstrating successful cloning of contactless transactions since at least 2012. Full cloning of cards is not possible, and current cloning methods can only rely on copying an out-of-date implementation of the contactless standard to...
Security is about planning for failure
As the world continues to become increasingly connected, organisations are faced with large quantities of data they need to protect and make sense of. International Data Corporation (IDC) predicts that 66% of CEOs will have digital transformation at the centre of...
Manage the risk of financial crimes, compliance threats
For months, there has been strong focus on the so-called Panama Papers and on the pending results of the national investigations faced by several implicated individuals. As more details emerge, there is one clear and significant take-out from this scandal – that white...
The most common reasons for corporate data loss
There is no doubt that one of the main assets of a company is the data it stores. Information about its customers, financial or employee planning, among other types of records, should be adequately protected and available whenever they are needed. For this reason,...
Experian cited in mobile fraud management report
Experian has been included in Forrester's 2016 "Vendor Landscape: Mobile Fraud Management Solutions" report, listed as having nine out of a possible 10 capabilities needed to combat mobile fraud. In addition, Experian was cited as having one of the highest total fraud...
F5 debuts standalone security products
Today's organisations are tasked to protect a growing number of attack vectors. A rising number of exploits seek to simply overwhelm servers with requests and deceptively use encryption to target networks and applications in ways that traditional products struggle to...
Cross the security skills chasm
Cyber-attacks, like a big old snowball, continue to grow as it rolls down the mountain. And in its wake are the good guys aka security professionals who are struggling to keep pace. The reality is cybercriminals and so-called hacktivists continue to deepen their...
Imperial Auto protects itself with Kaspersky
Imperial Auto, the largest network of vehicle dealerships in South Africa, has been protecting 3,200 endpoint users, as well as the servers in the virtual environment, with Kaspersky Endpoint Security for Business Advanced. The company lists the encryption element of...