Get proactive about the cybersecurity resource problem
Resources have always been a problem when it comes to cybersecurity. You are not always rewarded for doing security the way you are when you develop a new business application quickly. By Lucy Kerner, security evangelist and strategist at Red Hat This usually leads to...
Mid-sized companies largely defenceless against sophisticated attacks
Medium-sized companies in South Africa are in a precarious position in terms of cybersecurity. By Lukas van der Merwe, specialist sales executive: security at T-Systems South Africa While they find themselves firmly in the crosshairs of cybercriminals, they also have...
How to efficiently respond to a cybersecurity breach
In 2020, the world experienced multiple high-profile cybersecurity breaches across sectors, exposing the personal information of millions. In the face of ever-evolving cybercrime as the world moves towards digital-first infrastructure, it begs the question: what are...
Cybersecurity in 2020: lessons for tomorrow
The rollercoaster that was 2020 didn't leave us entirely bruised and battered. By Doros Hadjizenonos, regional sales director: SADC at Fortinet As you've undoubtedly heard several times by now, it's been quite a boost for technology adoption. Less mentioned, though,...
Security by design …
Security remains a consistent and ever-present challenge to the organisation today. The statistics that follow in its wake are certainly enough to keep any decision-maker awake at night. In 2020, Verizon's Data Breach Investigations Report found that 94% of malware...
Get the attacker’s view on your cyber defence
Steve Benton, deputy-chief security officer and, GM: cyber and physical security operations and programmes at BT, shares his insights on the five core aims of cyber attackers - and the multi-layered defence approach that could stop them targeting your business. I've...
The changing face of ransomware
There is a significant decrease in the sheer number of ransomware attacks due to improved security, better backup strategies and faster data recovery measures. By John Mc Loughlin, CEO of J2 This has meant that the spray and pray approach is no longer effective for...
Let’s talk cyber hygiene
Organisations in the Covid-19 pandemic era have been forced to look at their security hygiene best practices in order to minimise risk, data leakage and non-compliance, while still allowing for operational flexibility and efficiency. By Stefan van de Giessen, GM:...
Trust is good, but a zero-trust mindset is better
A few months ago, commuting to work, entering a crowded elevator, and sitting down in an open workspace next to several colleagues were trivial everyday activities. Amir Sohrabi, area vice-president: emerging markets at Citrix Unfortunately, with the current global...
What does Covid teach us about OT cybersecurity?
Today, almost no discussion about any subject goes on for long without the current pandemic being brought up in some way. Joe Robertson, EMEA CISO at Fortinet It dominates all of our lives in many ways. Of course, life must go on, business does continue. But not in...
Africa’s mobile cybercrime challenge
In June 2020, Upstream's Secure-D anti-fraud platform revealed that the total number of malicious mobile applications doubled in the first quarter of the year. The analysis found 29 000 malicious apps (14 500 in 2019), a 55% spike in fraudulent mobile transactions and...
New rules of engagement for next-gen managed IT security
The trends towards outsourced cyber security have gained traction during the Covid-19 pandemic as companies have empowered remote working models and increased their emphasis on digital transformation. The ever-widening cyber security skills gap adds further power to...