How Huawei uses its product security baseline in business processes
By Herman Kannenberg, Head of Legal Affairs and Cyber Security, Huawei South Africa - As ICT technologies evolve and enriches our lives, we're also seeing growing challenges to cyber security and privacy protection. Cyber security and privacy protection are the...
Beat cybercriminals at their own game with AI technology
Artificial intelligence (AI) technology is a powerful technology, and because of this, it holds great potential for exploitation by cybercriminals. By Derek Manky, chief: security insights and global threat alliances at Fortinet's FortiGuard Labs Considering this, the...
How to fight the new deepfake threat
After ransomware, the next mean-spirited genie to escape the cybercrime bottle will most likely be deepfakes: audio and video material, maliciously created with the help of artificial intelligence (AI) for manipulation and fraud purposes. By Chris Mayers, chief...
Secure your network from all angles
Making your network safe from the traditional north to south perspective is no longer enough. In a digital world, micro-segmentation that secures it from east to west is also vital. In the modern era of cyber-crime, ransomware and digital threat vectors, your...
Cybersecurity: businesses building walls to defend against nuclear attacks
While the growing number of data breaches and cyber attacks on companies shows that organisations are often not adequately equipped to protect themselves against such threats, privacy regulations being rolled out in many countries, such as GDPR in Europe and PoPIA in...
What you need to know about cryptocurrency
Criminals have kept pace with changing technologies by no longer wanting their crimes to generate hard cash - bitcoin has become the currency of choice. By Doros Hadjizenonos, regional sales manager at Fortinet That's particularly true for cybercrime, where ransomware...
What to do if you’re hit with a ransomware attack
Ransomware attacks have increased in volume, morphing and evolving through the years, especially recently, into the debilitating attacks we see today. By Anthony Giandomenico, practice director: digital forensics and incident response at Fortinet, and Aamir Lakhani,...
How much critical data do your work from home employees access?
Since the Covid-19 pandemic hit the world, South African organisations too, have taken drastic steps to ensure the safety of their employees By Claude Langley, regional sales manager: Africa for extended access technologies at HID Global When the very first lockdown...
Understand the full impact of cybercrime
Multiple threat vectors and variable threat actors, and, perhaps most worrying, repeated attacks on companies by cyber-crime pose a serious risk to organisations small and large alike. According to the Hiscox Cyber Readiness Report 2021, one-in-six of all firms...
Sophos acquires Capsule8
Sophos has acquired Capsule8, a pioneer of runtime visibility, detection and response for Linux production servers and containers covering on-premise and cloud workloads. Founded in 2016, Capsule8 is privately held and headquartered in New York. "Sophos already...
SMS firewalls the golden standard gateway for securing A2P SMS
Despite the influx of over the top (OTT) messaging solutions in recent years, application-to- person (A2P) SMS messaging remains the most widely used channel by businesses across the African region. SMS reach, ease of use and guaranteed high ROI are top reasons for...
Cyber threats on the rise in mining and manufacturing
Increasingly companies are looking to adopt smart technologies to optimise production and decision-making in order to create businesses of the future. However, as reliance on autonomous and digital technology grows, so too does the risk of cyber-attacks. As...