Do you know what’s lurking in your network?
Is there a ghost in your machine? And no, this is not the beginning of a Halloween story - but perhaps it is fitting that 'International Cybersecurity Awareness month' takes place in October, the month of Halloween. This is according to Stefan van de Giessen, GM:...
What caused the Capital One leak?
Earlier this year, the US credit card provider Capital One suffered one of the most jarring data leaks of the last decade. Sensitive financial data from over 106-million customers had been stolen and made freely accessible on the web for weeks. Now, recent analyses...
AI the perfect cyber defence partner
Building a safe future for business' critical data requires a collaborative effort between machine learning capabilities and traditional human decision-making. By Alex Healing, senior researcher: future cyber defence at BT In a climate where Internet of Things (IoT)...
Watch your perimeter
Imagine being able to detect if an intruder is attempting to breach the perimeter of a property in a remote location? Imagine knowing that your fence can detect the intrusion, notifying the authorities and preventing the intruders from getting any closer to their end...
Securing abandoned mines
In mineral-rich South Africa, mining is an important part of the GDP employing nearly half a million people. Vanessa Tyne, senior KAM and team lead at Axis Considering that the sector consists of diamonds, gold, platinum, and coal, it is easy to understand why local...
African trust centre launches cyber division
LAWtrust has launched a new division focusing on cyber security services to complement its identity, encryption and digital signature offerings to support customers in the ongoing battle for improved digital security. "LAWtrust has traditionally been focused on...
Actionable intelligence essential for cyber defence
With each new breach making headlines, it is becoming clearer and clearer that yesterday's defences are no match for today's attacks. The growing popularity of cloud services, mobile devices and the Internet of Things (IoT) is widening the attack surface, and targeted...
Improve network security with SD-WAN
Enterprises that are widely dispersed, geographically speaking, are rapidly moving to embrace software-defined wide area networks (SD-WANs). This is because SD-WANs dramatically lower costs, reduce complexity and make branch communications more secure, while also, in...
Changing cyber security best practice
Even though cyber security is a mission-critical part of ensuring business success in today's digital environment, not many local companies are prioritising this. According to Zaheer Ebrahim - Presales Engineer at Trend Micro, more must be done to ensure systems are...
Internal education, simulations key for security
A recent report by GreatHorn reveals that security experts have seen a 25% increase in the number of phishing emails that successfully evade security defences and arrive in users' inboxes, in the past year alone. By Lukas van der Merwe, specialist sales executive:...
Time is right for a career in cybersecurity
The cybersecurity landscape is a battle zone. War is being fought on every front, from email to firewalls to personnel to cracking complex codes, cybercriminals are evolving and adapting alongside the technology designed to protect organisations against them. For the...
Arcserve, Sophos partner on all-in-one data security
Arcserve has announced a global alliance with Sophos to provide organisations with dedicated protection for backed up data against cyberthreats. Through this collaboration, organisations can now employ the only market solution that integrates anti-ransomware and other...