Workonline deploys RPKI-based BGP Origin Validation
Workonline Communications has become the first African wholesale IP transit provider to deploy Resource Public Key Infrastructure (RPKI) Origin Validation (OV) to improve the security of Internet routing around the world. A specialised public key infrastructure (PKI)...
Intentionally insecure: poor security practices in the cloud
So far this year, there have been five documented cases of organisations exposing their private data due to misconfigured S3 buckets or cloud databases. By Lori MacVittie, principal threat evangelist at F5 Networks Wait, let's fix that: due to intentionally configured...
Trend simplifies security for Microsoft Azure environments
Trend Micro has announced the availability of highly optimised security solutions for Microsoft Azure workloads for its customers in sub-Sahara. The Trend Micro Deep Security suite takes into consideration that a customer needs to approach cloud security differently...
Autonomous IT, security solutions enable proactive IT
The cybersecurity of a business is still largely reliant on the people within each company's IT department. This is not sustainable long-term and organisations need to start looking to autonomous security measures to relieve some of the pressure felt by IT teams. By...
Trend Micro extends security offerings
Trend Micro has announced enhancements to its Deep Security and Cloud App Security products designed to extend protection to virtual machines on the Google Cloud Platform, Kubernetes platform protection, container image scanning integration with the Google Kubernetes...
Securing the Industrial Internet of Things
The very benefits that makes the Industrial Internet of Things (IIoT) so compelling, makes it equally capable of damaging infrastructure operations and processes through bad actors. Beginning with the Industrial Revolution in the mid 1700s, the manufacturing industry...
Assessing impacts: the meteors of security and AI
A 2018 study found that the illicit proceeds of global cybercrime had reached $1,5-trillion annually. Norton Security estimated that by 2023, a total of 33 billion records would be stolen each year. Internet of Things (IoT) attacks increased by 600% and Microsoft...
Digital transformation brings security challenges
As organisations across the board embrace technologies such as the Internet of things (IoT), big data, cloud, and mobility, security becomes more important than ever. But in an era of digital transformation, perimeter security simply cannot be the focus, instead,...
Digital convergence’s impact on OT security
There's an old expression that says, "when it rains it pours." This has never been more true than the current impact of digital transformation on security teams charged with protecting IT and OT networks. By Doros Hadjizenonos, regional director: SADC at Fortinet...
Trend Micro, Luxoft partner to secure vehicles, mobility services
Trend Micro has announced a strategic partnership with digital strategy and engineering firm Luxoft Holding to jointly introduce and deploy the Intrusion Detection System (IDS) and Intrusion Prevention Systems (IPS), a cybersecurity solution designed to detect,...

Security terminology demystified: malware edition
Malware – even the name should be enough to strike fear into the heart of technology. You’ve read the breakdown. You have squinted suspiciously at emails, your firewall and your antivirus programme. You know that cybercrime is a harsh reality that nobody can escape....
Fujitsu’s PalmSecure deployed in Korean airports
Fujitsu Korea (FKL) and Fujitsu have announced that the Korea Airports Corporation (KAC) has deployed Fujitsu's palm vein authentication system at all 14 domestic airports under its jurisdiction, to ameliorate congestion by identifying boarding passengers with...