How quickly could a cyber-attack take down critical infrastructure? 1 March 2019 With crucial national infrastructure like power systems and manufacturing currently in the spotlight, stakeholders need to consider the impacts of unseen risks, such as cyber-attacks, on operational technology networks.
Security and cloud computing 1 March 2019, Integrated Solutions Improving security is a strong motivation to accelerate the move from traditional IT architectures to modern, cloud ones.
Insiders and personal data fraud 1 March 2019, Security Services & Risk Management Our passport data, payment details, home addresses and e-mail addresses, phone numbers are stored in databases of more than a dozen institutions.
2019 cybersecurity crystal ball February 2019, Wolfpack Information Risk, Editor's Choice Craig Rosewarne, MD of Wolfpack Information Risk says the cyber landscape will be more volatile and dangerous in 2019, are we ready?
50% of companies can’t detect IoT breaches 1 February 2019, Editor's Choice, Infrastructure Only around half (48%) of businesses can detect if any of their IoT devices suffer a breach. This comes despite an increased focus on IoT security.
Data security sits at the heart of democracy 1 February 2019, Security Services & Risk Management A succession of high-profile government data breaches both locally and abroad has cast a stark light on the importance of effective public sector cybersecurity policies and protections.
Corporate fraud and insider threats 1 February 2019, Security Services & Risk Management Insider fraud and theft can often be more damaging to a company than risks from outside.
Corporate privacy in a selfie age 1 February 2019, Security Services & Risk Management Doros Hadjizenonos, regional sales director at Fortinet in South Africa looks at how CISOs can maintain corporate privacy even as employees adopt emerging technologies.
SME cybersecurity: high risk 1 February 2019, Infrastructure Small and medium-sized businesses are becoming more attractive targets for cyber criminals – both direct and also as a starting point for larger attacks across a supply chain.
Kaspersky unveils new partner programme 1 February 2019, Kaspersky, News & Events Specialised, enabling and profitable: Kaspersky Lab unveils new programme to empower its partners and improve services to clients.
Integration is communication 1 February 2019, AVeS Cyber Security, Integrated Solutions Communication is the missing link for integrating physical and IT security resources, says Charl Ueckermann, CEO at AVeS Cyber Security.
Attack of the thingbots 1 February 2019, Editor's Choice, Integrated Solutions New F5 Labs research reveals IoT devices are now hackers’ No.1 target as multi-purpose attack thingbots loom large.
IoT: The Good, the Bad, and the Ugly 1 February 2019, Integrated Solutions, Infrastructure Like any great Western, IoT is the new technology frontier and it brings its own fair share of challenges to the saloon.
Top password managers have fundamental flaws 1 February 2019 Top password managers have fundamental flaws that expose user credentials in computer memory while locked, according to new research.
Fortinet secures the path to 5G 1 February 2019, Infrastructure Fortinet Security Fabric delivers cloud-grade scalability, visibility, and control with carrier-grade performance and capacity to secure evolving 4G networks, IoT services and 5G mobility platforms.
Business must do more to limit exposure of data in the cloud 1 February 2019, Infrastructure Organisations should pay closer attention to security concerns associated with storing data in the cloud as configuration errors pose a risk to enterprise data.
37% of organisations impacted by cryptomining 1 February 2019 New report shows 20% of companies globally continue to be hit by cryptomining attacks every week; 33% of companies were hit by mobile malware, and just 4% by ransomware in the past 12 months.
Managing who, what and why Access & Identity Management Handbook 2019, Technews Publishing, Editor's Choice Today’s access control isn’t only concerned with who has access, but also what has access, why they need it and what they are doing with it.