The enemy within as email-borne threats rise
From BA to Equifax, WikiLeaks to GuptaLeaks, Hillary to Ivanka, leaked information as a result of indiscriminate email use or careless employee behaviour is giving organisations and politicians around the world sleepless nights. By Steve Herridge, Mimecast cyber...
How quickly could a cyber attack take down critical infrastructure?
With crucial national infrastructure like power systems and manufacturing currently in the spotlight, stakeholders need to consider the impacts of unseen risks, such as cyber attacks, on operational technology (OT) networks. By Doros Hadjizenonos, regional sales...
Fighting the cyber security threats to African banks
Foregenix is launching a service to combat the new and growing breed of cyber attacks on African banks. The global cyber security firm, which specialises in the financial services and has a regional hub in Johannesburg, is introducing the Foregenix Threat Sweep. Based...
The true value of digital and biometric data
The world of technology advancements has opened us up to several possibilities that were once considered a pipe dream. Although many offer convenience and have positively impacted ample aspects of society, it must be acknowledged that it has also opened us up to...
Tech holds the future of home security
The future of home security will see threats detected and responded to - before a crime can be committed. Making use of big data, home security systems are now able to analyse camera streams and proactively alert armed response service providers. This is a massive...

Your Security: demystifying the terminology
When it comes to security for your home, you understand exactly how it works. You push a button, alarm goes on, criminal enters your property, loud noise goes off and armed services arrive. It’s simple and something every South African understands as easily as...
RF remote controllers: know the potential cyber threats
Industrial manufacturers have come to rely a great deal on radio frequency (RF) protocols in their day-to-day functioning. From simple operations such as turning on a motor to more intricate functions like manoeuvring a heavy-duty vehicle, RF forms an integral part of...
Malicious Emotet trojan doing the rounds
A malevolent new trojan is doing the rounds: Emotet is reported to dwarf the impact of WannaCry and NotPetya which made headlines in 2018 for multimillion dollar losses incurred to businesses across the globe. This is according to Linda Morris of Smart Technology...
Kaspersky helps secure bionic technologies
Kaspersky Lab experts investigating the experimental cloud infrastructure for advanced bionic prostheses have identified several previously unknown security issues that could enable a third party to access, manipulate, steal or even delete the private data and more of...
Next-gen cybersecurity from Sophos Central Management
Sophos has announced that the next-gen Sophos XG Firewall is now available through Sophos Central, bringing Sophos' complete portfolio of cybersecurity solutions into a single, cloud-based management platform. Sophos partners and customers are now able to manage their...
Don’t underestimate the challenge of securing SD-WAN
Historically, the branch office of an organisation was the red-headed stepchild of the network, but digital transformation has changed all of that. By Doros Hadjizenonos, regional sales director for Fortinet in South Africa Today, transactions, workflows,...
Five-star peer-review rating for Fortinet
Fortinet network security products deliver outstanding functionality, ease of implementation and excellent cost-benefits. This is according to dozens of Fortinet customers from across the economic spectrum who posted their evaluations of the products on the Gartner...