Kaspersky buys stake in neuromorphic computing company
Kaspersky has become a shareholder of Motive Neuromorphic Technologies, a company specialising in neuromorphic computing technologies, with a 15% stake. The organisations' joint development efforts are aimed at creating new opportunities for machine learning-based...
Trend Micro tackles rising cybercrime in Africa
Trend Micro Incorporated is paving the way for a collaborative approach to fighting cybercrime amidst a 95% increase in attacks in South Africa. A chronic lack of investment in cybersecurity measures across the continent coupled with a growing dependence on technology...
Huawei’s recommendations for operators’ security best practices for 5G
By Syed Jawad Imam Jafri, Cyber Security and Privacy Officer (CSPO), Huawei South Africa - For operators' 5G security, the security and resilience of their networks need to be enhanced, network data and basic user data need to be protected, and network security...
Putting the safe into social.
In February 2021, the data from 500-million LinkedIn users was leaked by hackers. In June 2021, more than 700-million LinkedIn users had their data leaked and put up for sale. In June 2022, the FBI said that the fraud on LinkedIn posed a significant threat to the...
Huawei endeavors to help operators deploy and operate networks with high resilience
By Syed Jawad Imam Jafri, Cyber Security and Privacy Officer (CSPO), Huawei South Africa - In terms of business operations, it is imperative for Huawei to follow the security design principles of attack and defense. Specifically, enhanced cyber resilience based on...
Huawei’s 5G security assurance above standards for the core network
By Syed Jawad Imam Jafri, Cyber Security and Privacy Officer (CSPO), Huawei South Africa - Huawei has adopted various measures to assure the security for the 5G core network in the practice, from security standards to slice access and management security. ...
Demystifying cyberattacks on critical infrastructure
The notion of cyber-attacks seems distant from our daily lives, as we go about our work, social and family lives. By Carlo Bolzonello, country lead at Trellix Cyber-attacks feel like they happen to big businesses who can quickly bounce back from them after the issue...
Cybersecurity must-haves when it comes to defending business systems
Earlier this year, TransUnion was the target of a hacker group who obtained access to one of its servers containing the personal records of a significant number of South Africans. By Chris Norton, regional director for Africa at Veeam The group demanded a $15-million...
Shoprite ransomware a reminder of the role employees play in cybersecurity
Check Point Software Technologies is reminding African organisations of the importance of cybersecurity training for employees, following the recent cyber-attack on Shoprite Holdings. Ransomware attacks are currently rife - and increasing - across the African...
The mind-boggling puzzle of cybersecurity
Keeping pace with all the tools and technologies that provide protection from the cybersecurity onslaught can be overwhelming, but not impossible, writes Colin Thornton, chief commercial officer at Turrito Networks. There are a lot of statistics when it comes to...
SMEs vulnerable to cyber attacks
South Africa has the sixth highest rate of cybercrime victims worldwide, according to a report by international cybersecurity company Surfshark. Following the breach of President Cyril Ramaphosa's personal data by hackers, consumers have been cautioned to remain...
Cisco Security Cloud will connect and protect IT ecosystem
Cisco has unveiled its plan for a global, cloud-delivered, integrated security and networking service for organisations of any shape and size. The Cisco Security Cloud will be an open platform, protecting the integrity of the entire IT ecosystem - without public cloud...