Clarifying ‘next-generation’ security
In order to combat the rising sophistication of security threats, a holistic approach to the different aspects of next-generation security remains critical for today's business. This is according to Stefan van de Giessen, general manager: cyber security at Networks...
Internships, employment opportunities are key to bridging the cyber security skills gap
The skills shortage that exists around cyber security is by no means a South African problem, however, the global nature of the challenge is exacerbating the issue in the local market. By Simeon Tassev, MD and qualified security assessor at Galix Those few skilled...
Kaspersky passes independent SOC 2 audit
Kaspersky has successfully completed the Service Organisation Control for Service Organisations (SOC 2) Type 1 audit. The final report, issued by one of the Big Four accounting firms, confirms that the development and release of Kaspersky's threat detection rules...
Infinidat collaborates with Thales
Multi-petabyte data storage solution provider Infinidat, has announced a new integration between its InfiniBox storage system and the Thales SafeNet KeySecure platform. This integration leverages the OASIS Key Management Interoperability Protocol (KMIP) standard and...
Kaspersky helps SOCs to combat cyberthreats
Kaspersky's new offering for Security Operations Centers (SOCs) combines the company's competences, solutions and services with its Red Teaming service, which helps evaluate how well internal security teams are prepared for tailored breach scenarios. The combination...
Fujitsu consigns passwords to history with new PalmSecure biometrics
Fujitsu has launched a new, extended range of PalmSecure-based biometric security solutions that consigns passwords to history by making biometric ID easy to use across a wide variety of day-to-day applications. Available immediately to customers in Europe, the Middle...
Trend Micro to deliver network security with AWS Transit Gateway
Trend Micro has announced the extension of its industry leading network protection to the cloud, now available on Amazon Web Services (AWS) Marketplace. This was delivered in response to the operational challenges enterprises often experience with available network...
ESET discovers Window exploit used in a highly targeted attack
ESET researchers have discovered and analysed a 0-day exploit deployed in a highly targeted attack in Eastern Europe. The exploit used a local privilege escalation vulnerability in Microsoft Windows. ESET immediately reported the issue to the Microsoft Security...
Critical strategies for staying ahead of emerging cyberthreats
Over the past couple of decades, changes in the threat landscape have driven changes in how we design, implement, and manage security. By Doros Hadjizenonos, regional director: SADC at Fortinet Organisations have spent the last two decades updating their security gear...
One-size-fits-all approach not be enough to secure IoT
Securing the Internet of Things (IoT) is something which cannot be done with a one-size-fits-all approach - and every kind of connected object must be assessed individually. This is according to Steve Hanna, co-chair of the Trusted Computing Group's (TCG) Embedded...
Cloud security must be prioritised
For many South African organisations, the cloud is becoming an indispensable part of the standard operating procedure required for the digital landscape. And, thanks to the arrival of multinational data centres in the country, more decision-makers are experimenting...
Cybersecurity: focus on your people, lose the siloes
Ask any South African company what their major headaches are right now, and chances are that security will be near the top of the list. By Daniel Lotter, head of innovation at Itec South Africa Not just the burglar bars and CCTV type of security, either: as cybercrime...