DDoS attacks demand different defence strategies 1 November 2018 Despite the fact that firewalls, IPS and load balancers are some of the least effective mitigation measures against distributed DDoS attacks, they remain at the top of the list.
New defence approaches required 1 November 2018 As information security faces the need to evolve rapidly to meet a world of new challenges; visibility, user-centricity and crypto currencies will be the order of the day.
Smart cities. Is it wise to get smarter? 1 November 2018 As the popularity and inevitability of smart cities expand, so too does a cybercriminal’s opportunistic attack surface.
Effective edge security needs to be holistic October 2018, Technews Publishing The modern paradigm requires that a holistic and layered approach be adopted to secure networks from breaches at the edge, and everywhere else.
Basic cyber hygiene practices October 2018, Infrastructure When on the job at a corporate office, a healthcare organisation, or an academic institution or government agency, or even when you are working from a local coffee shop, restaurant, or home office, your organisation’s online safety and security is a responsibility shared by all.
Securing edge devices and the data they contain October 2018, AVeS Cyber Security, Editor's Choice, Infrastructure Charl Ueckermann looks at some best practices to ensure edge devices are not your biggest risk devices in a hyper-connected, perimeter-less world.
CyberGym launches South African arena October 2018, Wolfpack Information Risk, Editor's Choice, News & Events, Training & Education Wolfpack recently introduced a new cybersecurity training service to South Africa. CyberGym is an Israeli company that specialises in real-life cyber training, teaching students with real world simulations.
GreyEnergy group targeting critical infrastructure 1 October 2018, News & Events ESET researchers reveal a successor to the feared BlackEnergy APT group - in the footsteps of a feared threat actor, with a new arsenal of tools.
J2 offers enterprise-grade security for SMEs October 2018, News & Events Rising levels of cybercrime, and its increasing sophistication, threaten businesses of all sizes but SMEs are particularly vulnerable.
Tax season is financial crime season 1 October 2018, Security Services & Risk Management Carey van Vlaanderen from ESET offers some steps you can take to keep the scammers at bay during financial crime season – and all year round.
The most important features of a management platform September 2018, Technews Publishing, Editor's Choice, Surveillance, Access Control & Identity Management, Integrated Solutions Hi-Tech Security Solutions asks the industry for the top three features you should be looking for in a security management platform.
Nearly every third corporate data breach gets employees fired 1 September 2018, News & Events According to a new report from Kaspersky Lab and B2B International, 25% of data breaches in the Middle East, Turkey and Africa (META) region in the past year have led to people losing their jobs.
Threats to control rooms September 2018, Contract Surveillance Services, Surveillance CSS offers advice for protecting remote control rooms from criminal attacks and interference.
The link between passwords and sextortion 1 September 2018, Editor's Choice John Mc Loughlin, CEO of J2 Software, says the company is being engaged to consult with victims of what is becoming an alarming increase in incidents of sextortion.
Modern KPIs for effective cybersecurity 1 September 2018 Faced with increasingly frequent and sophisticated cyber-attacks, enterprises are scrambling to put technologies and processes in place to effectively detect and combat cyber risks.
Ten cybersecurity smart home tips from Ben-Gurion University 1 September 2018 According to cyber researchers at Ben-Gurion University of the Negev, Cyber Security Awareness Month is an excellent time to make a few simple changes that will result in a far greater level of safety and security.
Facing the cybersecurity challenge August 2018, Technews Publishing There are many cybersecurity products and solutions out there, but what do they offer and how will they protect you and strengthen your cybersecurity posture?