Cyber Security



Sasol ensures Zero Trust for SAP financials with bioLock
Issue 8 2022, Technews Publishing, Editor's Choice, Security Services & Risk Management
Multi-factor authentication, including biometrics, for SAP Financials from realtime North America prevents financial compliance avoidance for Sasol.

Read more...
Building a holistic application security process
Issue 8 2022, Altron Arrow
Altron Arrow asks what it means to build a holistic AppSec process. Learn what’s involved in a holistic approach and how to get started.

Read more...
Managing data privacy concerns when moving to the cloud
Issue 7 2022
While the cloud offers many business benefits, it can also raise concerns around compliance, and some organisations have taken the approach of staying out of the cloud for this reason.

Read more...
Accelerating your Zero Trust journey in manufacturing
Issue 7 2022, IT infrastructure, Industrial (Industry)
Francois van Hirtum, CTO of Obscure Technologies, advises manufacturers on a strategic approach to safeguarding their businesses against cyber breaches.

Read more...
The democratisation of threats
Issue 7 2022
Bugcrowd looks at some of the primary vulnerabilities the world faced in 2021, and the risks moving forward with growing attack surfaces and lucrative returns on crime.

Read more...
Protecting yourself from DDoS attacks
Issue 7 2022, Security Services & Risk Management
A DDoS attack, when an attacker floods a server or network with Internet traffic to prevent users from accessing connected online services, can be costly in both earnings and reputation.

Read more...
Exploiting Android accessibility services
Issue 7 2022
Pradeo Security recently neutralised an application using Android accessibility services that exploits the permission to perform fraudulent banking transactions.

Read more...
Cyber resilience is more than cybersecurity
Issue 7 2022, Technews Publishing, Editor's Choice, Integrated Solutions, IT infrastructure
Hi-Tech Security Solutions held a round-table discussion focusing on cyber resilience and found that while the resilience discipline includes cybersecurity, it also goes much further.

Read more...
Keeping devices in check
Issue 7 2022, Asset Management, EAS, RFID, IT infrastructure
Kaspersky patents new technology for analysing relationships between electronic devices to counter cyberattacks launched through connected IoT devices.

Read more...
Considering cloud downtime insurance?
Issue 7 2022, Arcserve Southern Africa, IT infrastructure, Security Services & Risk Management
Byron Horn-Botha, business unit head, Arcserve Southern Africa, reveals three vital steps that you must consider to ensure business continuity before you buy insurance.

Read more...
A robust OT cybersecurity strategy
Issue 7 2022, Editor's Choice, IT infrastructure, Industrial (Industry)
Cyber experts are still struggling to convince senior management to spend money to protect their control system assets, resulting in a lack of even basic measures to protect control systems.

Read more...
Why Multi-Factor Authentication, universal ZTNA and Zero Trust matter
Issue 7 2022, Access Control & Identity Management
Malicious cyber actors are experimenting with new attack vectors and increasing the frequency of zero-day and other attacks, according to Fortinet’s 1H 2022 FortiGuard Labs Threat Landscape report.

Read more...
Simplifying SIEM, EDR, XDR and SOAR
Issue 7 2022, Bitrate, Editor's Choice
Jeroen Dubbelman unpacks what some of the latest acronyms used in the cybersecurity industry actually mean to businesses looking for solutions for their cyber requirements.

Read more...
IT security at the core of smart cities
Issue 7 2022, IT infrastructure, Government and Parastatal (Industry)
The success of service delivery and public access to universal Wi-Fi, home automation and smart sensors is based on increased IT security.

Read more...
The $600 000 question
Issue 7 2022, Security Services & Risk Management, Financial (Industry)
Usman Choudhary, chief product officer of VIPRE Security Group, advises companies to do the basics to protect themselves before looking for cyber insurance.

Read more...
Securing IoT devices to maximise their value
Issue 7 2022, IT infrastructure
Anything that is connected to the Internet is a potential security vulnerability, and IoT devices are increasingly targets through which cybercriminals infiltrate networks.

Read more...
The rise of edge computing: What does it mean for cybersecurity?
Issue 7 2022, IT infrastructure
Edge computing reduces response times, decreases bandwidth usage and maximises the real-time value of data for applications, processing or storage, by bringing it all closer to the source.

Read more...
Ransomware loves retail
Issue 7 2022, Retail (Industry)
The retail industry was the second most targeted industry by ransomware in 2021, with 77% of retail organisations hit with ransomware, a 75% rise from 2020.

Read more...
Moore’s Law, sustainability and data centres
Issue 7 2022, IT infrastructure
Despite a sixfold increase in the data being processed since 2010, data centre energy consumption only increased by 6% to 2018, says Natalya Makarochkina, senior vice president, Secure Power Division, International Operations, Schneider Electric.

Read more...
Cloud can cut your security risks
Issue 7 2022, IT infrastructure
Todd Schoeman, BT client business director in South Africa, explores the ways that organisations can reduce security risk by using the cloud.

Read more...



      Page 1 of 71   Next >   Last >>