Old IoT vulnerabilities — a botnet gift that keeps on giving
The first thing anyone purchasing any device that connects to the Internet should do upon switching it on for the first time, is immediately update it. If you don't, you risk having it hijacked by a botnet. So says Bryan Hamman, territory manager for sub-Saharan...
Security implications for 5G and IoT
The advent of 5G networks is about much more than just incredibly fast speeds and more reliable connections, writes Doros Hadjizenonos, regional sales director for Fortinet in South Africa. When combined with today's powerful edge devices -- whether consumer-grade...
Cyber threats to escalate in 2019
South Africa is no stranger to data breaches, with databases of blue-chip companies such as Ster-Kinekor, ViewFines and Masters Deeds having been targeted in the recent past - often with staggering consequences for the companies and their clients. Doug Clare,...
Email security does not end with your password
Email is a crucial part of most people's daily lives, but few people consider how it's secured, apart from entering a password to access our accounts. What options are available or even advisable to use for securing email, asks Carey van Vlaanderen, CEO at ESET...
Cybercrime trends and financial services
The same concept holds true for cybercrime and the Financial Services industry. At the end of the day, regardless of who the ultimate victim of a cyberattack is, the end goal of most cyber events continues to be financial gain. By Doros Hadjizenonos, regional sales...
Create a cybersecurity culture
'Cybersecurity' is still a relatively new word, making its first appearance to reference "protecting a computer or computer system" in 1989. Since then, the term has evolved to incorporate every aspect of IT, information and cyber security. By Simeon Tassev, MD and...
Gemalto simplifies IoT connectivity
Gemalto is helping simplify and secure IoT connectivity for AT&T customers by integrating its embedded SIM (eSIM) inside the Cinterion LTE-M IoT module. The new solution streamlines development for OEMs and reduces the cost and complexity of IoT deployment by...
Are we prepared for 2019’s cyber security challenges?
"Technology is a queer thing. It brings you great gifts with one hand, and it stabs you in the back with the other," wrote novelist and scientist CP Snow in the New York Times in 1971. It still rings true today. Every new tool or technology we use introduces new...
Will Chrome update stop online ad abuse?
Google has taken another positive step toward making the Internet a safer place with the launch of Chrome 71. By Grant Hamilton, Check Point country manager South Africa Building on the ad-blocking measures introduced in Chrome 64 and 68, which prevented sites from...
Check Point named IDC MarketScape leader
Check Point Software Technologies has been named as leader in the IDC MarketScape: Worldwide Mobile Threat Management Software 2018-2019 Vendor Assessment. It is the second-consecutive year Check Point was named a leader in this category with its SandBlast Mobile...
Security challenges in the multi-cloud
The cloud argument has been settled and there is no doubt on the minds of the CIO and IT in general that the cloud is now just an extension of one's infrastructure. The current debate on the table is the adoption of a multi- or dispersed-cloud approach - and what this...
Collaboration key to protecting critical infrastructure
National power grids are increasingly becoming a target of hackers and attacks. Several hacks have been reported across the globe in recent years, drawing the world's attention to the vulnerability of national power supply systems, and bringing into question the...