It’s the end of passwords as we know it
Imagine it’s October 2050 and a school class is on a Cybersecurity Awareness Month field trip at the local museum. Suddenly, a student asks his teacher “what’s that?” staring at some strange combination of letters, symbols and numbers. “Oh, that’s a password,” the...
Hardware-based remote access solutions key to hybrid work security
As South Africa continues to grapple with the Covid-19 pandemic, the outbreak of the fourth wave and the discovery of the new omicron variant of the virus have likely scuppered the hopes of businesses seeing their employees return to the office any time soon. By Benji...
Better quality security requires synchronicity
There’s a lot of talk about cyber security - and for good reason. Barely a week passes without news of yet another high-profile breach, either in South Africa or abroad. By Antony Russell, chief technology officer of Telviva Perhaps the biggest risk for organisations...
Looking for trouble – cybersecurity for the digital age
Faced with relentless growth in cyberattacks, coupled with the complexity of today’s digital ecosystem, how should your business respond? Bas Burger, CEO: global at BT, shares his insights. There’s no going back. Over the past 18-months, businesses have got to grips...
Clearly defined roles and responsibilities critical for cloud security
When it comes to cloud versus on-premises infrastructure, security requirements remain the same, although the cloud requires additional controls because it is publicly available. By Simeon Tassev, MD and QSA at Galix The major difference is that on-prem has highly...
With ransomware, hindsight is 20/20
There are few things worse than discovering that your business has been compromised. Be it a phish, ransomware, hack or malicious attack, it's going to leave a long legacy of damage and complexity behind it. This is according to Martin Potgieter, co-founder and...
How hybrid work is pushing to end passwords
A new report from Cisco's Duo Security, the multi-factor authentication (MFA) and secure access solution, confirms that enterprises are taking steps to move away from passwords and adopting low-friction authentication methods to protect the hybrid workforce. While the...
What security trends to expect in 2022
Cybersecurity trends for 2022 include nuclear ransomware 3.0, a major power station/utility provider will be crippled, disinformation powered by deep fakes, the rise of dark economy M&A and more. This is according to KnowBe4, in its 2022 cybersecurity predictions...
The high cost of phishing
Is your business safe right now? Are you sure there isn't malicious software lurking on your system, waiting for the next backup before it sweeps through your systems like wildfire? The realistic answer is no. Cybercrime is smart, innovative, and agile. Cybercriminals...
Dell, AWS help protect customer data from ransomware attacks
Dell Technologies and Amazon Web Services (AWS) are bringing Dell's cyber recovery vault to the AWS Marketplace with the launch of Dell EMC PowerProtect Cyber Recovery for AWS. Through the AWS Marketplace, customers can easily purchase and deploy an air-gapped cyber...
Security trends and predictions for 2022
The changing of the leaves and the brisk fall mornings around Boston are a sign that 2021 is nearing its end, writes Lior Div, CEO and co-founder of Cybereason. It's a time that I like to reflect on the year gone by and think about the potential for the new year. In...
The Cybercrimes Act becomes partially operational
Certain provisions of the Cybercrimes Act become operational on 1 December 2021, as South Africa gets closer to protecting businesses and individuals against cyber attacks and malicious communications. By Peter Grealy, Nozipho Mngomezulu, Karl Blom, Wendy Tembedza,...