Tips to secure your business against cybercrime in the cloud era
The cloud is very attractive to South African businesses. It provides flexible and agile technology - ideal for companies keen to digitise, automate and innovate. Cloud models inherently use operational funding, creating better cost control and reducing up-front...
Securing the perimeter is not enough to protect your data
Despite the fact that it is a decades-old exploit, phishing remains a top threat to organisations today. Bad actors looking to steal personal information and credentials will use phishing scams because they are simple and effective, and once they have access, they can...
Deepfakes are a growing cyberthreat
Social media and online news sites are awash with video and audio clips that add interest and an element of dynamism to static content. By Kumar Vaibhav, solution architect at In2IT But can we really believe everything we see and hear? Deepfake technology, the...
The shift to 5G impacts security and surveillance
5G goes beyond just the ability to surf the internet at a faster pace. Consumers may still be awaiting mass availability of 5G-enabled devices, but the groundwork is already being laid for the infrastructure and for businesses to embrace its full potential, writes...
Russia-Ukraine conflict impacts local cyber threats
Hybrid warfare, using cyber as a vector, has not only blurred boundaries between nations, but also between war and peace; friend and foe; and the virtual world and reality. By Nithen Naidoo, CEO and co-founder or Snode Technologies As tensions increase following...
Should XDR drive your security strategy?
Security teams are short-staffed, network complexity continues to increase, and the cost of data breaches are growing. But XDR offers an opportunity to reverse these trends and more. By Yossi Naar, chief visionary officer and co-founder of Cybereason A recent SecBI...
Look again: CISO in the spotlight
Kevin Brown, MD of BT Security, examines the continuing rise of cybersecurity to top of the business agenda to become a mainstream business issue. It's been a little more than a year since we launched our inaugural research titled CISOs in the spotlight, in which we...
Kaspersky launches secure connectivity solutions
Kaspersky is launching its Cyber Immunity vision to the IoT community at Mobile World Congress, is presenting its complete portfolio of consumer cybersecurity technologies for the mobile industry. The global pandemic led to rapid digital transformation, not only...
Check Point SecureAcademy collaborates with Namibia University of Science & Technology
Check Point Software Technologies has partnered with the Namibia University of Science and Technology (NUST), Complete Enterprise Solutions (CES), and Salt Essential IT to help tackle the cybersecurity skills shortage in Namibia. The partnership between Check Point...
The next wave of ransomware …
Ransomware as a trend will continue to affect businesses across the world in 2022 - with attack types and tactics from cybercriminals evolving all the time. By Edwin Weijdema, global technologist at Veeam As attacks get more sophisticated, so do the consequences of...
What are the cybercrime trends for 2022?
This year will see cybercrime incidents, fallouts, and innovations rise to worrying new levels of sophistication and reach. F5 Labs assembled a group of experts to delve into the detail. Prediction 1: State-sponsored criminals will adopt cybercrime toolsets Advanced...
Hornetsecurity reveals that backup solutions are critical to fight malware
A recent global survey by Hornetsecurity shows that a staggering one in five companies is likely to fall victim to a ransomware attack, in which malicious software (malware) is used with the threat to either publish data, or block access to data or a computer system...