Security versus functionality: how to avoid an end user revolt
One of the biggest challenges facing any chief information security office (CISO) today is a term we call end user revolt - when users circumvent all security measures and protocols in order to do their jobs. By Wayne Olsen, managing executive: cybersecurity at BCX...
Recognise, report and prevent phishing
One significant finding published in Fortinet's 1H 2022 FortiGuard Labs Threat Report is that ransomware is rampant. By: Aamir Lakhani, global security strategist and researcher and Rob Rashotte, vice-president: global training and technical field enablement at...
So many needles. One giant haystack
Cyber security is exhausting. It keeps worried security analysts awake at night. Will there be a zero-day that they couldn't have predicted? Will someone use a terrible password that leads to a terrible hack? It also constantly harasses security operations centres...
Top cybersecurity tips for business
Cybersecurity Awareness Month started in the US in 2004, but has rapidly expanded around the world as the threat of cyberattacks against businesses continues to grow in a digital age. For me, there are four key practices every company should be looking at when it...
Bridge the gap between CEO and CISO to achieve cyber resilience
In early September around 50 000 users had their personal details exposed when the fintech Revolut was breached in a cyber attack. The latest attack is one in a rising tide of breaches which are unlikely to subside until CEOs and CISOs can close the gap between how...
Public sector must up its game against cybercrime
South Africa needs a sustained national public awareness campaign to inform, educate and mobilise the South African public against a growing pandemic of cybercrime. By Moss Gondwe, public sector director at Mimecast While much progress has been made in educating the...
CISO role is more important then ever
The chief information security officer role has leapt from backroom to boardroom, just like the ever-evolving security threat, writes Wayne Olsen, managing executive: cybersecurity at BCX. The role of the CISO has traditionally been behind the doors of the Security...
Kaspersky patents technology for analysing relationships between electronic devices
Kaspersky's latest invention is intended for logically linking various electronic devices into a single network around the account of the owner and identifying similarities between device configurations. The technology will help to prevent any user devices from...
Sophos extends MDR service compatibility
Sophos, a global leader in innovating and delivering cybersecurity as a service, has launched new third-party security technology compatibilities with Sophos Managed Detection and Response (MDR) to better detect and remediate attacks with speed and precision across...
Cybersecurity starts with users who can open or slam doors shut for criminals
Cybersecurity is not an event or a once-off checklist, rather it is about building a security mindset in the face of ever-evolving threats, say cybersecurity experts at Altron Karabina, as South Africa joins the rest of the world in observing cybersecurity month....
HP Launches Sure Access Enterprise
HP has announced enhancements to its HP Wolf Security endpoint protection portfolio, with the launch of Sure Access Enterprise (SAE). SAE protects users with rights to access sensitive data, systems, and applications. It prevents attackers from hijacking these...
Cybersecurity as important as physical security
Cybersecurity is possibly even more important than locks, vaults and walls in protecting the modern business. This is according to members of the Institute of Information Technology Practitioners South Africa (IITPSA) Cybersecurity Special Interest Group (SIGCyber)....