The growing costs of cybercrime
Modern enterprises face an onslaught of cyberattacks from many quarters and must not only be prepared to contend with the direct costs of potential breaches, but also with spiralling indirect costs, such as compliance fines and reputational damage. By Simeon Tassev,...
Robots take up the cybersecurity fight
The massive surge in cybercrime, the ever-increasing number of threat vectors, and a critical skills shortage has left organisations feeling more vulnerable to cyberattacks than ever before. With exponentially more ransomware incidents being reported than there are...
Look again at security automation
The sheer scale and pace of today’s cyber threats could prove overwhelming for the security department, outpacing its resources. Hila Meller, BT Security, Global Head of Sales shares BT’s own learnings on the top five things to consider for your security automation...
DeFi needs more cybersecurity and regulations
The world of decentralised finance (DeFi) is defined by interesting projects, varied cryptocurrencies, blockchains, financial innovations and promises of wealth and digital freedom. It is also populated by the type of people and organisations that usually hang around...
How to weather the approaching cybercrime perfect storm
The world generates an estimated 2.5 quintillion bytes of data every day. Amidst this mind-boggling amount of chatter, a very real threat is lurking: cybercrime, which has increased by 600% since the start of the pandemic, the United Nations reports. This surge in...
Securing your business information is more important than ever
With the country returning to some form of normalcy, an echo of the pandemic remains: the hybrid working model. This trend is spurred on by among others escalating fuel prices that makes it simply more affordable to alternate working from home and the office. By Carl...
Update your security strategy based on key information learned about threat actors
The reality of the cyber threats posed today is that many threat actors are not rogue operators acting on their own but are, instead, working as part of sophisticated and organised groups, collaborating with other groups within a wider ecosystem of specialists. These...
Kaspersky buys stake in neuromorphic computing company
Kaspersky has become a shareholder of Motive Neuromorphic Technologies, a company specialising in neuromorphic computing technologies, with a 15% stake. The organisations' joint development efforts are aimed at creating new opportunities for machine learning-based...
Trend Micro tackles rising cybercrime in Africa
Trend Micro Incorporated is paving the way for a collaborative approach to fighting cybercrime amidst a 95% increase in attacks in South Africa. A chronic lack of investment in cybersecurity measures across the continent coupled with a growing dependence on technology...
Huawei’s recommendations for operators’ security best practices for 5G
By Syed Jawad Imam Jafri, Cyber Security and Privacy Officer (CSPO), Huawei South Africa - For operators' 5G security, the security and resilience of their networks need to be enhanced, network data and basic user data need to be protected, and network security...
Putting the safe into social.
In February 2021, the data from 500-million LinkedIn users was leaked by hackers. In June 2021, more than 700-million LinkedIn users had their data leaked and put up for sale. In June 2022, the FBI said that the fraud on LinkedIn posed a significant threat to the...
Huawei endeavors to help operators deploy and operate networks with high resilience
By Syed Jawad Imam Jafri, Cyber Security and Privacy Officer (CSPO), Huawei South Africa - In terms of business operations, it is imperative for Huawei to follow the security design principles of attack and defense. Specifically, enhanced cyber resilience based on...