Critical strategies for staying ahead of emerging cyberthreats
Over the past couple of decades, changes in the threat landscape have driven changes in how we design, implement, and manage security. By Doros Hadjizenonos, regional director: SADC at Fortinet Organisations have spent the last two decades updating their security gear...
One-size-fits-all approach not be enough to secure IoT
Securing the Internet of Things (IoT) is something which cannot be done with a one-size-fits-all approach - and every kind of connected object must be assessed individually. This is according to Steve Hanna, co-chair of the Trusted Computing Group's (TCG) Embedded...
Cloud security must be prioritised
For many South African organisations, the cloud is becoming an indispensable part of the standard operating procedure required for the digital landscape. And, thanks to the arrival of multinational data centres in the country, more decision-makers are experimenting...
Cybersecurity: focus on your people, lose the siloes
Ask any South African company what their major headaches are right now, and chances are that security will be near the top of the list. By Daniel Lotter, head of innovation at Itec South Africa Not just the burglar bars and CCTV type of security, either: as cybercrime...
Digital transformation’s growing attack surface
Traditional business models need to be reimagined as digital transformation continues to enable businesses to innovate and find new ways to not only leverage data but keep abreast of customer's evolving requirements. While this presents innumerable opportunities, it...
Kaspersky extends co-operation with Interpol
Kaspersky and Interpol have signed a new five-year agreement to reinforce their collaboration in the fight against cybercrime around the world. This is the second agreement between the two parties following the first signed in 2014. On 3 July, Eugene Kaspersky, CEO of...
Tips for keeping your business safe online
No business, whether large or small, can afford to ignore cybersecurity, and the pressure to protect businesses is mounting as cybercriminals hone their skills to target a company's weakest points. While bigger corporations generally have large IT departments to...
Kaspersky helps eliminate smart home controller vulnerabilities
Kaspersky researchers investigating the control device for an active smart home ecosystem have identified several critical vulnerabilities. These include bugs in the cloud infrastructure and potential remote code execution that would allow a third party to get 'super...
Stop navel-gazing at encryption
We are so enthralled by our own brilliance in cryptography that we forget that most data at rest - tucked away inside databases - is unencrypted. By Lori MacVittie, principal technical evangelist at F5 Networks Case in point, a Skyhigh analysis of encryption controls...
Trend Micro software blocks 5m camera hack attempts
Trend Micro says it has blocked 5-million attempted cyberattacks against IP cameras in just five months. Through its strategic partnership with global IP security solution provider Vivotek, Trend Micro's IoT security solutions are embedded in globally deployed IP...
Certified protection to counter banking malware threats
These days, there isn't much that can't be done on mobile, and that includes banking. For many people, banking apps are the go-to method of managing finances. As a result, mobile banking malware targeting Android phones has become a serious and somewhat underestimated...
Build a human firewall to fight human errors
With Kaspersky research showing 970 557 phishing attacks detected in South Africa in Q1 2019 alone - an average of 10 783 per day - and 53 829 mobile malware attacks in the same period - an increase of 6% compared to Q1 2018 - one has to ask how vulnerable companies...