Abundant scarcity: addressing the skills shortages in security
The cybersecurity workforce gap expanded by a concerning 26.2% in 2022 compared to 2021. That's around 3.4 million people needed to ensure that the security of assets is managed effectively. These statistics from the (ISC)2 2022 Cybersecurity Workforce Study are why...
In future, OT security will take an integrated approach
Operational technology (OT) cyber security, while currently lagging behind IT security and facing growing risk, is now positioned to leapfrog directly into an advanced level of cyber security maturity. This is according to Matthew Taljaard, systems engineer:...
Local platform to secure Bitcoin launches
Bitcoin is easily lost -- when a storage device is misplaced or stolen, through a scam or phishing attack or when an exchange crash wipes out your investment. BitDirect is a platform that enables Bitcoin investors to manage their cryptocurrency investments through a...
What you need to know about security during loadshedding
Everything is going fine, but then the power cuts out. No problem, your employees have laptops, and backup systems keep PCs running. But what about your data? What steps have you taken to ensure your business information and application services remain available when...
Conversational AI helps fight fraud while reducing friction for customers
The risks of identity fraud remain as high as ever for consumers and banks alike. Global research from Experian shows that 58% of consumers have been a victim of online fraud or know someone who has been a victim, or both. The challenge that banks face is protecting...
Data protection is about more than just thwarting cyberattacks
The fact that ransomware and cyberattacks have become increasingly prevalent is common knowledge, and this has raised greater awareness of the need for effective data protection. By Kate Mollett, regional director of Commvault Africa However, ransomware and other data...
Hacktivism and the new age of cyber warfare
In the most recent edition of its annual Security Report, Check Point Software Technologies looked back on a tumultuous year in cybersecurity, with the boundaries between state cyber-operations and hacktivism becoming blurred as nation states act with a degree of...
I am the CEO; no, I am the CEO
One of the most successful cyber-attacks of 2022 is CEO fraud, also known as business email compromise (BEC). According to the FBI's Internet Crime Complaint Centre 2021 report, this type of attack is one of the most profitable, and one that has seen a significant...
What you need to know about deploying AI to your security stack
Is there any single technology burdened with more hype than artificial intelligence (AI)? Bb Brian Pinnock, vice-president: sales engineering EMEA at Mimeast I recently chatted to author and technologist Mo Gawdat about his book Scary Smart. In our discussion the...
How ransomware has evolved
In the most recent edition of its annual Security Report, Check Point Software Technologies looked back on a tumultuous year in cybersecurity, which saw attack levels reach an all-time high in response to the Russia-Ukraine conflict. But what can we expect in the...
HP extends remote PC management with HP Wolf Connect
HP Inc has announced HP Wolf Connect, an IT management connectivity solution that provides a highly resilient and secure connection to remote PCs, enabling IT to manage devices even when powered down or offline. Using a cellular-based network, HP Wolf Connect's robust...
Public sector must respond to online threats in real time
Despite its various structural challenges, the South African economy continues to grow. Over time, this resilience and further potential for growth has attracted the attention of global cyber criminals. In this article, Trellix SA country lead Carlo Bolzonello argues...