SA needs cyber defence to combat growing onslaught
Now in its 18th year, Cybersecurity Awareness Month (CSAM) in October is a global initiative first launched by the US Department of Homeland Security and National Cyber Security Alliance to raise awareness of the role everyone can play in improving cyber security. By...
Stop security threats early
An always-on, cloud-based email security solution is critical in today's complex cybersecurity environment. By John Mc Loughlin, CEO of J2 Every business needs comprehensive protection including a cloud-based email security solution that reduces the complexity of...
How to survive the cybercrime pandemic
The pandemic forced everyone to spend more time online than they did before. By Schalk Visser, chief technology officer at Cell C This was out of necessity because of remote working and the need to buy services and products online. A global collective of highly...
Must-have considerations of endpoint protection solutions
In today's connected landscape, there is a growing complexity associated with safeguarding the myriad of endpoint devices accessing the corporate network. By Ralph Berndt, sales and marketing director of Syrex The unpredictability of attacks and threats are...
Why co-sourcing is a smart choice for cybersecurity now
Todd Schoeman, BT client business director in South Africa, shares insights on how a collaborative model for security can help organisations defend against rapidly increasing cyber threats. In 2020, tactical IT decisions had to be taken at breakneck speed to enable...
Are you ready for the war on cybercrime and ransomware?
Not all heroes wear capes. Many work quietly and diligently behind the scenes, amassing evidence and uncovering clues until there's enough to go on to take the enemy down. By Derek Manky, chief: security insights and global threat alliances at Fortinet's FortiGuard...
Cyber-security: craft a back-to-basics layered approach
Cyber-crime has risen exponentially since the start of the global pandemic. While no security is full proof, crafting a security posture with multiple layers, built on the basic tenets of cyber-security is certainly a good start. By Patrick Assheton-Smith, CEO at...
Has cybersecurity become too complex to manage alone?
As businesses rise to meet the challenge of the always on digital workspace, the pressure on IT staff is growing. By Markus Erb, vice-president: services at Logicalis Group With more people working from home and using their personal devices, businesses are exposed to...
Account takeover fraud on the rise
Banking fraud management has always been dynamic, fast paced, and complex, writes Toby Carlin, senior director: fraud, cyber and compliance at FICO. Fraudsters are constantly evolving their tactics to adapt to changes in the banking landscape and exploit weaknesses...
Securing smart devices in OT environments
The Industrial Internet of Things (IIoT) is all about connecting people, processes, and assets. Traditionally, devices in OT environments have been isolated or connected directly to an industrial control system. IIoT gives these devices a link to the internet. By Joe...
The new DDoS ‘normal’ is not normal in any way …
Threat actors will never turn down an opportunity for innovation, and the Covid-19 pandemic has provided an enormous such opportunity. We are seeing this quite clearly in the numbers coming through - and the new 'normal' around distributed denial of service (DDoS)...
Critical cyber threat landscape insights from 2021 for CISOs
The first six months of 2021 saw a significant increase in the volume and sophistication of attacks targeting individuals, organisations, and increasingly critical infrastructure. This is not just more of the same. Cybercriminals have upped their game, and they...