
Security Terminology Demystified: Spam
Is it a tin of unidentifiable meat that was once a staple of the 1970s diet or is it the security threat that everyone forgets? Spam, both the extremely concerning meat product in a tin and the email security threat, is the scourge of humans around the world. It’s the...
Cyber security: humility key to constant improvement
If we are to continue improving our response to cyber risk, we must accept that breaches will happen. When they do, we must detect, respond and - most importantly - learn from them, writes Michiel Jonker, director: IT advisory at BDO South Africa. While technology and...
Bank cards still a secure, convenient payment option
Recently, there's been a lot in the news about the supposed increase in card fraud attempts. While this has understandably made some people nervous about using their bank cards, Chris Wood, executive for card issuing and payments at Nedbank, remains positive that,...
DeepFakes: when seeing isn’t believing
Deepfake technology is rapidly becoming easier and quicker to create and it's opening a door into a new form of cybercrime. Although it's still mostly seen as relatively harmful or even humorous, this craze could take a more sinister turn in the future and be at the...
The importance of XDR for cyber protection
With 35% of South African organisations expecting an imminent cyberattack and a further 31% bracing for it to happen within a year, according to local research conducted by Trend Micro, attention is turning to whether existing solutions are up to the challenge of...
Enhance cybersecurity practices
October is cybersecurity month and to promote cybersecurity awareness, Steven Cohen, MD of Triple S Solutions, a full-service information technology business, offers the following nine simple but important points to stay safe. * Companies sending invoices should make...
The new cyber-norm
Today is D-Day for banks and the City of Johannesburg to pay ransom demands sent through by hackers last week. Bryan Hamman, Regional Director at NETSCOUT, which offers NETSCOUT Arbor, specialising in advanced DDos protection solutions, offers this explanation of DDoS...
Security spend on the rise
The global cybersecurity market is booming, the demand for cybersecurity solutions is huge and security spend has already started outpacing IT spend. Adoption in South Africa is not yet growing at the same rate, but there is a strong growth in interest and...
Protect yourself on business trips
Business executives who are keepers of secrets of the company are high-priority targets for cyber espionage. Especially, when traveling, precautionary measures - including those outside the world of IT - are essential, and they must be accompanied by an awareness of...
Do you know what’s lurking in your network?
Is there a ghost in your machine? And no, this is not the beginning of a Halloween story - but perhaps it is fitting that 'International Cybersecurity Awareness month' takes place in October, the month of Halloween. This is according to Stefan van de Giessen, GM:...
What caused the Capital One leak?
Earlier this year, the US credit card provider Capital One suffered one of the most jarring data leaks of the last decade. Sensitive financial data from over 106-million customers had been stolen and made freely accessible on the web for weeks. Now, recent analyses...
AI the perfect cyber defence partner
Building a safe future for business' critical data requires a collaborative effort between machine learning capabilities and traditional human decision-making. By Alex Healing, senior researcher: future cyber defence at BT In a climate where Internet of Things (IoT)...