Zero Trust Network Access the next step in an evolving security landscape
The hybrid workplace continues to enjoy consistent adoption, particularly amongst those industries that do not require their workforce to be at the office every day. The benefits are well-published and tangible, however, it has also brought with it smorgasbord of...
Data management at the core of ransomware readiness
Ransomware is one of the biggest threats and challenges facing organisations today. A simple online search will reveal hundreds of high-profile attacks and scary statistics around the acceleration of ransomware incidents and the costs involved. By Kate Mollett,...
Is the public cloud secure?
Is the public cloud safe? Organisations often have this concern as they engage services from third-party cloud hosts. They may have a point - the public cloud is not necessarily as secure as we want to think. The rise in cyberattacks partially correlates with the...
Cybersecurity depends on the people too
Check Point Software Technologies marks Cybersecurity Awareness Month (October) by highlighting the need for each and every individual to prioritise cybersecurity, in both their business and personal lives, in order to fend off the ever-increasing risk of cyberattack....
Get back to security basics
Cybersecurity is everyone's problem. It is the problem of the beleaguered chief information security officer (CISO), of the CEO and the manager; and of every employee at every level of the organisation from the person serving the tea to the person leading the team....
Trellix finds open source projects could be at risk
Trellix has announced the establishment of the Trellix Advanced Research Center to advance global threat intelligence. Comprised of hundreds of the world's most elite security analysts and researchers, the Advanced Research Center produces actionable real-time...
Step up your surveillance game with Seagate SkyHawk™
When looking for a hard drive to power your CCTV security network, a standard HDD won’t do the trick, as the need for always-on operational demand and high-definition images is simply too high. Surveillance drives are specifically focused on mass data and speed - and...
Kaspersky invites young innovators to step up
Kaspersky has announced an open call for Secur'IT Cup '22 - the international competition for talented motivated students, and young researchers seeking to change the world of technology by enhancing its security. With the increasing penetration of digital technology...
Common Facebook Marketplace scams and how to avoid them
Last year, Facebook Marketplace passed 1-billion global users. With this, it has become a giant in the consumer-to-consumer commerce space, allowing individual Facebook users to buy and sell seamlessly. Carey van Vlaanderen, CEO of ESET South Africa shares critical...
Understanding cybersecurity in the post-pandemic era
Prior to the Covid pandemic, employees would access data from within the office environment through a secure, centralised on-premises network. By Ian Engelbrecht, system engineering manager at Veeam Africa As remote and hybrid work became the norm, the attack surface...
Technology Education Day: teaching younger generations about cybersecurity
Technology Education Day (today, 23 September) assumes more significance than ever as so much course work and classroom teaching relies on digital platforms. No matter what field of study they choose, be it engineering or business, there is no way students can...
IT security at the heart of smart cities
South Africa is currently in the process of developing smart cities - one in Gauteng and one in the Eastern Cape. More will surely follow as this is the future of living; where technology and connectivity are deeply ingrained in the processes of daily life. By Wandile...