Tech meets physical security
Violent crime still plagues many South African businesses and homes despite the proliferation of security companies. This is mainly due to the mismatch between the product offering of the security company and the needs and requirements of their customers, says George...
When it comes to ransomware, don’t forget the basics
Ransomware is getting nastier and more expensive all the time and it has affected almost every industry and geography. No one is immune from the threat. By Renee Tarun, deputy CISO/ vice-president: information security at Fortinet In a global ransomware...
Tips to secure your business against cybercrime in the cloud era
The cloud is very attractive to South African businesses. It provides flexible and agile technology - ideal for companies keen to digitise, automate and innovate. Cloud models inherently use operational funding, creating better cost control and reducing up-front...
Securing the perimeter is not enough to protect your data
Despite the fact that it is a decades-old exploit, phishing remains a top threat to organisations today. Bad actors looking to steal personal information and credentials will use phishing scams because they are simple and effective, and once they have access, they can...
Deepfakes are a growing cyberthreat
Social media and online news sites are awash with video and audio clips that add interest and an element of dynamism to static content. By Kumar Vaibhav, solution architect at In2IT But can we really believe everything we see and hear? Deepfake technology, the...
The shift to 5G impacts security and surveillance
5G goes beyond just the ability to surf the internet at a faster pace. Consumers may still be awaiting mass availability of 5G-enabled devices, but the groundwork is already being laid for the infrastructure and for businesses to embrace its full potential, writes...
Russia-Ukraine conflict impacts local cyber threats
Hybrid warfare, using cyber as a vector, has not only blurred boundaries between nations, but also between war and peace; friend and foe; and the virtual world and reality. By Nithen Naidoo, CEO and co-founder or Snode Technologies As tensions increase following...
Should XDR drive your security strategy?
Security teams are short-staffed, network complexity continues to increase, and the cost of data breaches are growing. But XDR offers an opportunity to reverse these trends and more. By Yossi Naar, chief visionary officer and co-founder of Cybereason A recent SecBI...
Look again: CISO in the spotlight
Kevin Brown, MD of BT Security, examines the continuing rise of cybersecurity to top of the business agenda to become a mainstream business issue. It's been a little more than a year since we launched our inaugural research titled CISOs in the spotlight, in which we...
Kaspersky launches secure connectivity solutions
Kaspersky is launching its Cyber Immunity vision to the IoT community at Mobile World Congress, is presenting its complete portfolio of consumer cybersecurity technologies for the mobile industry. The global pandemic led to rapid digital transformation, not only...
Check Point SecureAcademy collaborates with Namibia University of Science & Technology
Check Point Software Technologies has partnered with the Namibia University of Science and Technology (NUST), Complete Enterprise Solutions (CES), and Salt Essential IT to help tackle the cybersecurity skills shortage in Namibia. The partnership between Check Point...
The next wave of ransomware …
Ransomware as a trend will continue to affect businesses across the world in 2022 - with attack types and tactics from cybercriminals evolving all the time. By Edwin Weijdema, global technologist at Veeam As attacks get more sophisticated, so do the consequences of...