Must-have considerations of endpoint protection solutions
In today's connected landscape, there is a growing complexity associated with safeguarding the myriad of endpoint devices accessing the corporate network. By Ralph Berndt, sales and marketing director of Syrex The unpredictability of attacks and threats are...
Why co-sourcing is a smart choice for cybersecurity now
Todd Schoeman, BT client business director in South Africa, shares insights on how a collaborative model for security can help organisations defend against rapidly increasing cyber threats. In 2020, tactical IT decisions had to be taken at breakneck speed to enable...
Are you ready for the war on cybercrime and ransomware?
Not all heroes wear capes. Many work quietly and diligently behind the scenes, amassing evidence and uncovering clues until there's enough to go on to take the enemy down. By Derek Manky, chief: security insights and global threat alliances at Fortinet's FortiGuard...
Cyber-security: craft a back-to-basics layered approach
Cyber-crime has risen exponentially since the start of the global pandemic. While no security is full proof, crafting a security posture with multiple layers, built on the basic tenets of cyber-security is certainly a good start. By Patrick Assheton-Smith, CEO at...
Has cybersecurity become too complex to manage alone?
As businesses rise to meet the challenge of the always on digital workspace, the pressure on IT staff is growing. By Markus Erb, vice-president: services at Logicalis Group With more people working from home and using their personal devices, businesses are exposed to...
Account takeover fraud on the rise
Banking fraud management has always been dynamic, fast paced, and complex, writes Toby Carlin, senior director: fraud, cyber and compliance at FICO. Fraudsters are constantly evolving their tactics to adapt to changes in the banking landscape and exploit weaknesses...
Securing smart devices in OT environments
The Industrial Internet of Things (IIoT) is all about connecting people, processes, and assets. Traditionally, devices in OT environments have been isolated or connected directly to an industrial control system. IIoT gives these devices a link to the internet. By Joe...
The new DDoS ‘normal’ is not normal in any way …
Threat actors will never turn down an opportunity for innovation, and the Covid-19 pandemic has provided an enormous such opportunity. We are seeing this quite clearly in the numbers coming through - and the new 'normal' around distributed denial of service (DDoS)...
Critical cyber threat landscape insights from 2021 for CISOs
The first six months of 2021 saw a significant increase in the volume and sophistication of attacks targeting individuals, organisations, and increasingly critical infrastructure. This is not just more of the same. Cybercriminals have upped their game, and they...
Cyber criminals adapt to deceive
Cyber criminals are constantly adapting their approach to deceive their targets and increase their success rate. There is a new trend developing that speaks directly to this phenomenon, it is an adapted version to completing a successful change of bank details fraud....
Understanding the evolving cybersecurity landscape
Given the global disruption that took place last year, it is hardly surprising that malware increased by 358% and ransomware by 435% as compared to 2019. By Richard Frost, product head: network and endpoint security at Vox The rapid push to digitalise and embrace work...
How to keep kids safe online
Ensuring that your children are absolutely safe and protected online has become as critical as securing them in the real world. You would not drive without putting your child in a seatbelt. Or hand them a carving knife without showing them how to use it. So do not put...