How much critical data do your work from home employees access?
Since the Covid-19 pandemic hit the world, South African organisations too, have taken drastic steps to ensure the safety of their employees By Claude Langley, regional sales manager: Africa for extended access technologies at HID Global When the very first lockdown...
Understand the full impact of cybercrime
Multiple threat vectors and variable threat actors, and, perhaps most worrying, repeated attacks on companies by cyber-crime pose a serious risk to organisations small and large alike. According to the Hiscox Cyber Readiness Report 2021, one-in-six of all firms...
Sophos acquires Capsule8
Sophos has acquired Capsule8, a pioneer of runtime visibility, detection and response for Linux production servers and containers covering on-premise and cloud workloads. Founded in 2016, Capsule8 is privately held and headquartered in New York. "Sophos already...
SMS firewalls the golden standard gateway for securing A2P SMS
Despite the influx of over the top (OTT) messaging solutions in recent years, application-to- person (A2P) SMS messaging remains the most widely used channel by businesses across the African region. SMS reach, ease of use and guaranteed high ROI are top reasons for...
Cyber threats on the rise in mining and manufacturing
Increasingly companies are looking to adopt smart technologies to optimise production and decision-making in order to create businesses of the future. However, as reliance on autonomous and digital technology grows, so too does the risk of cyber-attacks. As...
Navigating internet usage and safety against digital predators
Unfortunately, we face a grim reality around sexual abuse online against children. The question remains: How can parents identify and address the problem and how do we better navigate internet usage and safety for our children? By Richard Frost, head of network and...
Automation and AI in security: what’s the big deal?
In 1988, a Cornell University graduate student named Robert Morris wanted to measure the size of the Internet. He wrote a program that could spread across a network, install itself on machines, and then Morris would count the instances. From that, the now-infamous...
Inside the mind of a cyber criminal
Cyber criminals come in many different flavours, but the majority of them are in it for one thing: financial pay-off. They want the money that comes with offering their tools or services, selling stolen data, extortion like ransomware or plain fraud. And they all have...
Huawei Product Security Baseline
In 2020, the COVID-19 pandemic changed the way we live, work and how organisations operate. Many activities have moved online, and telecommuting, video conferencing, distance education, and telemedicine have become the new normal. In this context, digital technology...
Insights into cloud security 2021
With cloud security continuing to be a hot topic in 2021, Fortinet and Cybersecurity Insiders decided to ask cybersecurity professionals around the world and across all industries for their latest insight. By Doros Hadjizenonos, regional sales manager at Fortinet The...
Cybersecurity threats don’t care where you are
Global connectivity has meant that, more than ever before, South Africa is a part of the global village - and while that certainly comes with myriad benefits, it also comes with the need for an increased focus on cyber security for the state, enterprises, and home...
Team Qhubeka Assos increases protection with Acronis
Cyber protection provider Acronis and Team Qhubeka Assos, Africa's UCI WorldTour cycling team, have announced a cyber protection partnership in which Acronis cloud services distributor, Resello, will provide Team Qhubeka Assos with cyber protection technology. As one...