GNL Cyber launches South African operation

August 2017 Editor's Choice, Information Security, News & Events, Training & Education

Gold N’ Links Cyber (GNL) has established its presence in South Africa. Its launch event at its new Johannesburg offices in July was attended by a variety of dignitaries, key leaders in business, as well as VIPs such as the outgoing Israeli Ambassador.

GNL is part of the global Gold N’ Links group, headquartered in Israel, where the company provides next generation cybersecurity solutions, services and training in cooperation with a variety of cybersecurity companies, as well as leading tertiary institution, Ariel University, with its a focus on cybercrime training and human resource development.

Locally, the company is headed by Dr Graham Wright, previously CEO of Business Against Crime South Africa, and consultant to the Consumer Goods Council of South Africa. The local team includes Roi Shaposhnik who is responsible for international business development and who travels between Israel and South Africa, as well as Jim Green, the chief technical officer.

Like its head office in Israel, GNL offers a full portfolio of cyber-security services and training opportunities to customers. While both services are run from South Africa, they are linked to the cyber experts in Israel to ensure that the latest information, intelligence, skills and training materials are made available locally.

Security Operations Centre

Visitors to the opening ceremony were split into three interactive groups, each of which was given a tour of the company’s facilities.

The first stop was the Security Operations Centre (SOC), where cybersecurity experts are able to manage the security of customers’ infrastructures. Large screens provide a visual presentation of security risk alerts, from which first response operations commence. This facility is linked to its Israeli partners who have access to the latest threat intelligence and powerful analytical capabilities.

A dashboard provides operators with a quick overview of the status of GNL’s customers’ cybersecurity events, threats and incidents across the globe, making use of a variety of sources for information.

The system highlights threats or potential problems that require more investigation, prompting the operators to investigate and take action if required. These issues range from external hacking attempts, right through to internal problems due to fraud and malware infections as a result of phishing such as the recent Petya attacks (www.securitysa.com/57724n).

The well established link with cybersecurity experts in Israel provides the local specialists on the ground with an additional resource of intelligence to warn of pending attacks, or the latest in risk or breach mitigation strategies. Both SOCs, in Johannesburg and Israel, are operational on a 24x7 basis and are therefore in a position to identify problems before customers are even made aware of them.

Attending the launch of Gold N’ Links South Africa, from left to right: Roi Shaposhnik (GNL Cyber), JB Bloch (PSG), Ambassador Arthur Lenk (Israel), Itai Melchoir (Head of Israeli Trade & Economic Office). Front: Yacoov Haran (CEO of Triple Cyber, Israel).
Attending the launch of Gold N’ Links South Africa, from left to right: Roi Shaposhnik (GNL Cyber), JB Bloch (PSG), Ambassador Arthur Lenk (Israel), Itai Melchoir (Head of Israeli Trade & Economic Office). Front: Yacoov Haran (CEO of Triple Cyber, Israel).

Training centre

Supporting the SOC is a training centre at which GNL provides training in the latest issues and defences against cyber attacks. The training centre caters for a variety of clients, from the general office worker, to the IT professional and senior company executives. Its purpose is to provide the necessary awareness and critical insight to reduce the risk of cyber attacks in real time.

The training centre is linked to Ariel University where attack simulations can be carried out, allowing trainees – typically IT professionals – to safely test their skills against what could happen in the real world. The benefit of this simulated attack is that the whole process can be reversed and replayed to show people where they went wrong or to allow them to apply their latest training against the latest attack scenarios.

Finally, GNL offers crisis management training for executives in the event of a successful cyber attack, designed to assist in the management of communications with shareholders, stakeholders and the media.

Hacking a bank

The final part of the launch event was a video link to a cybersecurity expert in Israel who demonstrated successful hacks into large organisations, which included a banking website.

Everyone present was astounded at how simple mistakes in the development of a web interface could allow hackers to easily access the bank’s site. More shocking perhaps was that they were witness to the fact that it’s possible to gain access to accounts without knowing usernames or passwords.

Given the recent spate of well publicised cyber attacks on companies around the globe, GNL has set up shop in South Africa at the right time. While companies here may be reticent to admit when they have been breached and lost sensitive customer information, new laws on the horizon will force them to come clean. These regulations may even hold directors liable for allowing it to happen if adequate measures were not taken to mitigate these risks.

GNL’s live SOC and training capabilities, linked with the best cyber expertise globally, may just be the solution some large local companies are looking for.

For more information contact Dr Graham Wright, Gold N’ Links Cyber, +27 (0)83 252 5727, grahamw@gnlcyber.com, www.gnlcyber.com.





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Rise in malicious insider threat reports
News & Events Information Security
Mimecast Study finds 46% of SA organisations report a rise in malicious insider threat reports over the past year: reveals disconnect between security awareness and technical controls as AI-powered attacks accelerate.

Read more...
Surveillance & AI roundtable
DeepAlert Lytehouse Refraime SMART Security Solutions Technews Publishing Editor's Choice Surveillance Integrated Solutions AI & Data Analytics
SMART Security Solutions held an online roundtable with a few surveillance experts to explore the intersection of surveillance and AI, gaining insights into the market and how control rooms are evolving.

Read more...
New campaign exploiting Google Tasks notifications
News & Events Information Security
New phishing scheme abuses legitimate Google Tasks notifications to trick corporate users into revealing corporate login credentials, which can then be used to gain unauthorised access to company systems, steal data, or launch further attacks.

Read more...
What’s in store for PAM and IAM?
Access Control & Identity Management Information Security
Leostream predicts changes in Identity and Access Management (IAM) and Privileged Access Management (PAM) in the coming year, driven by evolving cybersecurity realities, hybridisation, AI, and more.

Read more...
The challenges of cybersecurity in access control
Technews Publishing SMART Security Solutions Access Control & Identity Management Information Security
SMART Security Solutions summarises the key points dealing with modern cyber risks facing access control systems, from Mercury Security’s white paper “Meeting the Challenges of Cybersecurity in Access Control: A Future-Ready Approach.”

Read more...
Securing your access hardware and software
SMART Security Solutions Technews Publishing RBH Access Technologies Access Control & Identity Management Information Security
Securing access control technology is critical for physical and digital security. Every interaction between readers, controllers, and host systems creates a potential attack point for those with nefarious intent.

Read more...
Phishing and social engineering are the most significant risks
News & Events Information Security
ESET Research found that phishing accounted for 45,7% of all detected cyberthreats in South Africa, with higher-quality deepfakes, signs of AI-generated phishing websites, and short-lived advertising campaigns designed to evade detection.

Read more...
Access trends for 2026
Technews Publishing SMART Security Solutions RR Electronic Security Solutions Enkulu Technologies IDEMIA neaMetrics Editor's Choice Access Control & Identity Management Infrastructure
The access control and identity management industry has been the cornerstone of organisations of all sizes for decades. SMART Security Solutions asked local integrators and distributors about the primary trends in the access and identity market for 2026.

Read more...
Access data for business efficiency
Continuum Identity Editor's Choice Access Control & Identity Management AI & Data Analytics Facilities & Building Management
In all organisations, access systems are paramount to securing people, data, places, goods, and resources. Today, hybrid systems deliver significant added value to users at a much lower cost.

Read more...
Zero Trust access control
Technews Publishing SMART Security Solutions CASA Software NEC XON Editor's Choice Access Control & Identity Management Information Security
Zero Trust Architecture enforces the rule of ‘never trust, always verify’. It changes an organisation’s security posture by assuming that threats exist both inside and outside the perimeter, and it applies to information and physical security.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.