IndigoCube, Akana partner on API management and security solutions
Akana has appointed IndigoCube as one of its preferred partners in South Africa. Akana helps businesses accelerate digital transformation by securely extending their reach across multiple channels – mobile, cloud and Internet of Things. Akana enables enterprises to...
DDoS extortion – a new threat to look out for
A hybrid security approach is a company's best chance of mitigating DDoS extortion attacks, says Gad Elkin, security sales director: EMEA at F5 Networks. It is a testament to the sustained evolution of the cybersecurity landscape that we are still regularly seeing the...
Managing identities across the organisation
Identity management (IDM) is essentially the management and administration of individual identities within a system, such as a business or a network. "Everyone has a digital presence of sorts," says Gerald Naidoo, CEO of Logical Consulting. "This could be social media...
How to protect yourself from online fraudsters
You receive an email or text message claiming you have won a cash prize, but you don't recall entering a competition. It says that to receive the money, you will need to share your banking details - what should you do? The answer is simple. Never provide personal...
User awareness is key in preventing cyber-attacks
Cyber-attacks have become a thriving and profitable industry for criminals, a fact that is evidenced by the increasing number of well publicised and high profile attacks over the past year. By Simeon Tassev, director of Galix. The majority of these attacks, which are...
BT ramps up cyber-attack protection
BT has announced the global launch of "BT Assure Ethical Hacking for Finance", a new security service designed to test the exposure of financial services organisations to cyber-attacks. The wealth of valuable and sensitive personal data held by financial...
Ransomware on the rise in 2015
In the second quarter of 2015 there was an average of 230 000 new malware samples created daily, totalling 21 million from April to June. This is a 43% increase in comparison to the second quarter of 2014. Trojans continue to be the most common type of malware and are...
Forget contactless, this is how we’ll pay for things in the future
For decades, it was cash, cards and checks, but the way we pay has evolved massively in recent years. Internet shopping brought the high street into our homes, mobile payments put power in our pockets, and contactless cards make transactions as simple as 'tap and go'....
Access management simplified with new app
Local biometrics solutions provider Ideco has launched an app in cooperation with its Electronic Visitor Identity Management (EVIM) solution that now makes visitor access management quick and easy. EVIM is a mobile data capture and fingerprint scanning device that...
Managing the insider threat
The more valuable a businesses' intellectual property is, the higher the chances that cyber criminals will try to get their hands on it. "Threats to organisations are prolific. Anyone who reads the news will have seen countless reports about threat actors breaching...
Ashley Madison represents new darker stage of cyber hacking
Cyber criminals are increasingly hacking for ransom, raising concerns around data security and privacy, writes Gary Newe, technical director at F5 Networks. In late July, Avid Life Media (ALM) - owners of online dating site Ashley Madison - confirmed it had been the...
Fortinet unveils SDNS framework
Fortinet has announced its new Software-Defined Network Security (SDNS) framework – the first of its kind across the industry.