Cyber security at the rugby world cup
Get the braaivleis and biltong ready because this year's highly anticipated rugby world cup in Japan will be the biggest and most tech-enabled event the world has ever seen. Simon McCullough, F5 Networks' major channel account manager, discusses the cyber security...
The rise of nation-state attacks
A new phase of cyber warfare has begun. Simon McCullough, major channel account manager at F5 Networks Hackers acting on behalf of nation-state powers are no longer just out to disrupt critical infrastructures - they're also actively seeking trade secrets. New battle...
ESET launches Safer Kids Online
ESET has launched its Safer Kids Online platform, a resource site dedicated to building a safer online environment for children. Including videos, articles and expert insight, the website offers resources for children, parents and schools with the aim to enable...
Built-in email security
Security vendors agree that we are evolving into an era where to improve the management and visibility of cybersecurity, enterprises must deploy fewer security solutions. However, there is a risk associated with this model and Thiani Naicker, Microsoft Practice...
Security Terminology Demystified: Phishing
Oh no! The bank is about to close my overdraft! I should definitely click on this link and get this sorted out ... Stop. Don’t click on the link. Don’t open the attachment. Don’t fill in those details. And definitely don’t hand over your personal information. When you...
Kaspersky Security for Microsoft Office 365 protects OneDrive
Kaspersky Security for Microsoft Office 365 expands protection capabilities from Exchange Online to include Microsoft storage service OneDrive. The product prevents malware from infiltrating OneDrive and spreading across corporate networks. This is achieved through...
BT delivers security services for icare
BT has signed a contract to deploy a cloud-based SIEM service for icare, a regional provider of insurance and care services to the businesses, people and communities of New South Wales, Australia. By selecting BT, icare will benefit from market-leading cyber security...
Users still the weakest link in the IT security strategy
Cyber security threats are constantly evolving but one remains the same - users. When asked whether users really are still the weakest link in companies' cyber security defence strategy, Michael Morton, Solutions Architect at Securicom, says: "Yes, yes and yes." He...
Datacentrix attains ISO certification
Datacentrix has been awarded the ISO 27001 certification of its information security management system (ISMS). The certification is a framework of policies and procedures that includes all legal, physical and technical controls involved in an organisation's...
How can companies protect themselves from future ransomware attacks?
The recent ransomware attack on Johannesburg power utility City Power shows how easy it is for organisations to fall victim to cybercriminals, who often carry out attacks that are financially motivated. By Lukas van der Merwe, specialist sales executive: security at...
Security Terminology Demystified: The Botnet
You are now part of a collective, controlled by an unseen presence and forced to do their bidding ... In our comprehensive guide to all the security threats that are out on the market today we listed some of the most virulent and one of these is the botnet. A botnet...
Data security in the age of the cloud
With IT spending in South Africa on the increase and organisations increasingly turning to the cloud to host their data, cybersecurity must remain a strategic priority. And so it has become less about the technical capabilities of protection and more about...