The enemy within – insider security threats May 2019, Wolfpack Information Risk, Editor's Choice, Financial (Industry) Insider threats in today’s financial world are insidious and destructive and your defence against insiders should start long before the person assumes his/her position.
The benefits of machine learning and UEBA May 2019 Combining accurate and essential user behavioural data with machine learning allows you to more accurately monitor your users on an endpoint-by-endpoint basis.
Protecting Microsoft cloud environments May 2019, Integrated Solutions Trend Micro Southern Africa announced the local launch of its Trend Micro Cloud App Security point of presence, designed to provide customers added security and protection of their Microsoft Office 365 environments.
Securing the Industrial Internet of Things May 2019, Axiz, IT infrastructure, Industrial (Industry) The very benefits that makes the IIoT so compelling, makes it equally capable of damaging infrastructure operations and processes through bad actors.
Vivotek strengthens cybersecurity May 2019, CCTV, Surveillance & Remote Monitoring Vivotek has announced the availability of comprehensive protection in its Cybersecurity Management Solution under the strategy of its 'Security within Security' campaign.
Scammers target job seekers May 2019 Kaspersky Lab experts detected a blast of sophisticated spam emails in the first quarter of 2019, featuring fake job-offers that seemed to come from HR recruiters in large corporations.
Insiders: who are they? May 2019, Security Services & Risk Management The 2018 Insider Threat Report by Cybersecurity Insiders reports that more than 51% of companies are concerned about unintentional insider attacks.
Cyber/physical perils in hospitality April 2019, Wolfpack Information Risk, Editor's Choice, Entertainment and Hospitality (Industry) How can we prepare for our holidays and avoid becoming the victim of a scam or data breach?
New supply chain attack April 2019, Kaspersky Lab Kaspersky Lab has uncovered a new advanced persistent threat (APT) campaign that has affected a large number of users through what is known as a supply chain attack.
When cybercrime affects health and safety April 2019, Editor's Choice The threat of a category-one cyber-attack is that everything could seem right – the readings on the meter could be fine, checklists would be followed, and equipment would work – yet danger could still unfold.
Cloud and mobile deployments are the weakest links April 2019, Check Point South Africa Report highlights the cloud and mobile attack vectors used to target enterprises: nearly one in five organisations experienced a cloud security incident in the past year.
Overcoming the 2019 cyberthreat April 2019, IT infrastructure The flexibility of remote working is good, however, the wider a network perimeter has to stretch, the more scope exists for security breaches.
IoT is convergence in action March 2019, Gijima Electronic and Security Systems (GESS), NEC XON, Technews Publishing, Axiz, G4S South Africa, Editor's Choice, Integrated Solutions, IT infrastructure The Internet of Things gains more than enough attention these days, but the IoT demonstrates the reality of the convergence between the physical and cyber worlds, and physical security is part of it.