It is time to take a quantum leap in IoT cybersecurity Issue 8 2022, Drive Control Corporation IoT has become integrated everywhere, including enterprises. While it offers many benefits, such as increased productivity and the rollout of mission critical applications, it can also lead to (enterprise) cyber-attack vulnerabilities.
What to do in the face of growing ransomware attacks Issue 8 2022, Technews Publishing, Security Services & Risk Management Ransomware attacks are proliferating, with attackers becoming more sophisticated and aggressive, and often hitting the same victims more than once, in more than one way.
Can we reduce cyberattacks in 2023? Issue 8 2022 Zero-trust cybersecurity strategy with simplicity and risk reduction at the heart is mandatory to reduce exponential cyberattacks in 2023, says GlobalData.
Key success factors that boost security resilience Issue 8 2022 Adoption of zero trust, secure access service edge and extended detection and response technologies, all resulted in significant increases in resilient outcomes, as are executive support and cultivating a security culture.
Enterprise threats in 2023 Issue 8 2022, News Large businesses and government structures should prepare for cybercriminals using media to blackmail organisations, reporting alleged data leaks, and purchasing initial access to previously compromised companies on the darknet.
CA Southern Africa unmasks container security Issue 8 2022, Technews Publishing, IT infrastructure Adoption of software containers has risen dramatically as more organisations realise the benefits of this virtualised technology.
Shifts in threat landscape to industrial control systems Issue 8 2022 Kaspersky’s ICS CERT researchers’ predictions include increased attack surface due to digitisation, activities of volunteer and cybercriminal insiders, ransomware attacks on critical infrastructure as well as the technical, economic and geopolitical effects, and the rise of potential vulnerabilities being exploited by attackers.
Advanced persistent cybercrime Issue 8 2022 FortiGuard Labs predicts the convergence of advanced persistent threat methods with cybercrime. Advanced persistent cybercrime enables new wave of destructive attacks at scale, fuelled by Cybercrime-as-a-Service.
Digital razor wire: sharpening endpoint protection Issue 8 2022 Crypto-mining, hacking, vulnerabilities, and threats – protecting the organisation’s endpoints has never been more important than it is today, says Reggie Nkabinde, consultant: modern platform-security at Altron Karabina.
Industrial control systems under attack Issue 8 2022, News According to Kaspersky ICS CERT statistics, from January to September 2022, 38% of computers in the industrial control systems (ICS) environment in the META region were attacked using multiple means.
OSINT: A new dimension in cybersecurity Issue 8 2022 The ancient Chinese strategist Sun Tzu noted, you should always try to know what the enemy knows and know more than the enemy.
Sasol ensures Zero Trust for SAP financials with bioLock Issue 8 2022, Technews Publishing, Editor's Choice, Security Services & Risk Management Multi-factor authentication, including biometrics, for SAP Financials from realtime North America prevents financial compliance avoidance for Sasol.
Building a holistic application security process Issue 8 2022, Altron Arrow Altron Arrow asks what it means to build a holistic AppSec process. Learn what’s involved in a holistic approach and how to get started.
Managing data privacy concerns when moving to the cloud Issue 7 2022 While the cloud offers many business benefits, it can also raise concerns around compliance, and some organisations have taken the approach of staying out of the cloud for this reason.
Accelerating your Zero Trust journey in manufacturing Issue 7 2022, IT infrastructure, Industrial (Industry) Francois van Hirtum, CTO of Obscure Technologies, advises manufacturers on a strategic approach to safeguarding their businesses against cyber breaches.
The democratisation of threats Issue 7 2022 Bugcrowd looks at some of the primary vulnerabilities the world faced in 2021, and the risks moving forward with growing attack surfaces and lucrative returns on crime.
Protecting yourself from DDoS attacks Issue 7 2022, Security Services & Risk Management A DDoS attack, when an attacker floods a server or network with Internet traffic to prevent users from accessing connected online services, can be costly in both earnings and reputation.
Cyber resilience is more than cybersecurity Issue 7 2022, Technews Publishing, Editor's Choice, Integrated Solutions, IT infrastructure Hi-Tech Security Solutions held a round-table discussion focusing on cyber resilience and found that while the resilience discipline includes cybersecurity, it also goes much further.