Access management key to secure data
There’s a quip in the IT industry: who is driving digital transformation in your company: the CEO, the CIO or Covid? And, of course, the response is generally Covid. While Covid has precipitated organisations along an accelerated digitalisation path, the very speed...
The bold decisions CISOs need to make today
CISOs are entering a golden period of opportunity to take decisive action to shape their security strategy for the future of work. By Kevin Brown MD of BT Security. This is a rare opportunity to drive an agenda that puts security at the heart of every future step. And...
Putting the AI into security
Artificial intelligence (AI) in cybersecurity has been touted as the cure all elixir that will swoop in and provide the organisation with smart security and protection on the virtual frontlines. Predicted to replace the human in the cyber war against crime, AI in...
Absa launches cybersecurity academy for the visually impaired
Absa Group, in collaboration with the Hein Wagner Academy, will be launching South Africa's first Cybersecurity Academy for the visually impaired. Accepted students will receive a full scholarship to the Absa Cybersecurity Academy for the Blind based in Worcester,...
What does the future hold for cybersecurity and cloud platforms?
With the staggering number of cyberattacks and data breaches that occurred during the last 12 - 18 months, cybercrime is one of the fastest growing criminal enterprises in 2021. Willem Barnard, business development manager and alliances, and Christo Esterhuizen, cloud...
Is the future really passwordless?
Passwords are inherently problematic and are the weakest link in many security chains, writes Simeon Tassev, QSA & MD at Galix. People forget them, or do not set them to be strong enough; they reuse the same password for multiple accounts, they write them down,...
Tips for women on building a career in cybersecurity
Representation of women in the cybersecurity industry has grown over the past years and, while this is positive, there is still room for improvement. Growth and success in this area requires that everyone work together to amplify but this is easier said than done. How...
A collaborative model for security
Successfully co-sourcing security infrastructure involves overcoming key barriers to establish a strong relationship based on shared responsibility, writes Tris Morgan, director of global advisory at BT. Following the disruption of 2020, it's important that security...
Product security is critical to cyber security
By Herman Kannenberg, Head of Legal Affairs and Cyber Security, Huawei South Africa - If you follow the news, you'll have noticed that there has been a significant uptick in the number of cybersecurity-related articles and stories lately. This is because cyber-attacks...
How Huawei uses its product security baseline in business processes
By Herman Kannenberg, Head of Legal Affairs and Cyber Security, Huawei South Africa - As ICT technologies evolve and enriches our lives, we're also seeing growing challenges to cyber security and privacy protection. Cyber security and privacy protection are the...
Beat cybercriminals at their own game with AI technology
Artificial intelligence (AI) technology is a powerful technology, and because of this, it holds great potential for exploitation by cybercriminals. By Derek Manky, chief: security insights and global threat alliances at Fortinet's FortiGuard Labs Considering this, the...
How to fight the new deepfake threat
After ransomware, the next mean-spirited genie to escape the cybercrime bottle will most likely be deepfakes: audio and video material, maliciously created with the help of artificial intelligence (AI) for manipulation and fraud purposes. By Chris Mayers, chief...