MENU

Security
Category

Doros Hadjizenonos, Country Manager of Check Point South Africa.

Ransomware doubled in second half of 2016, says Check Point

February 22, 2017 • Security, Top StoriesComments (0)

Check Point® Software Technologies Ltd released its H2 2016 Global Threat Intelligence Trends, revealing that ransomware attacks doubled during the period. Out of all recognised malware incidents globally, the percentage of ransomware attacks increased from 5.5% to 10.5% between July and December 2016. The H2 2016 Global Threat Intelligence Trends Report...

Read More
DDoS attacks affect more than just IT.

DDoS, what you need to know about this type of cyber attack

February 22, 2017 • Security, Top StoriesComments (0)

With Distributed Denial of Service (DDoS) attacks increasing considerably in size, frequency and complexity, according to the recently released Arbor Networks’ 12th Annual Worldwide Infrastructure Security report, the chances of organisations being hit by a...

Amy DeMartine and Jeff Pollard Forrester's analysts.

Take action or face the consequences says Forrester

February 16, 2017 • General, Internet of Things, Opinion, SecurityComments (0)

According to Forrester, 2017 will be a year of action. While the company has advised a strong focus on technology to improve customer experience, it has also warned that trying to play catch-up with early technology movers could spell disaster for companies...

(image source: pixabay.com)

IoT 2020: Smart and secure IoT platform

February 16, 2017 • Internet of Things, Security, Top StoriesComments (0)

The Internet of Things (IoT) significantly impacts the global economy and is expected to grow exponentially over the coming years, transforming society as a whole. In order to develop a smart and secure IoT platform, certain critical issues must be addressed...

The growing skills gap as demand for qualified cyber security professionals continues to outstrip supply (image: Shutterstock)

Cyber security skills gap leaves 37% organisations exposed

February 14, 2017 • Security, Top StoriesComments (0)

Sophisticated cyber security defenses are increasingly in high demand as a cyber security attack is now viewed as an inevitability. However, a majority of surveyed organizational leaders fear they are ill-equipped to address these threats head-on. According...

Alastair Paterson, CEO and Co-Founder of Digital Shadows (Source: YHP)

Sometimes it’s Best to Avoid “Cupid’s” Arrow

February 13, 2017 • Opinion, Security, Southern AfricaComments (0)

Valentine’s Day is fast-approaching and the story goes that if Cupid hits you with his golden arrow you’ll fall madly in love. And who doesn’t want to fall madly in love? But there are other actors taking aim at you on Valentine’s Day whose arrows you...

6 ways that hackers can access your bank account.

6 ways your bank account could be hacked

February 9, 2017 • Security, Top StoriesComments (0)

With the heightened threat of hacks by fraudsters attempting to access people’s bank accounts through text messages, emails, phone calls etc., it is important we are armed with knowledge of the different ways our bank accounts can be hacked by these...

Kaspersky Lab

Cybercriminals target 40 countries using “invisible” malware

February 9, 2017 • Security, Top StoriesComments (0)

Kaspersky Lab experts have discovered a series of “invisible” targeted attacks that use only legitimate software: widely available penetration-testing and administration tools as well as the PowerShell framework for task automation in Windows – dropping...

Martin Walshaw, Senior Engineer at F5 Networks.

Protect yourself from cybercriminals this Valentine’s day

February 8, 2017 • Big Data, Cloud Computing, Opinion, SecurityComments (2)

According to romantic legend, St. Valentine was quite the match-maker, marrying young couples against the wishes of Emperor Claudius II and literally losing his head into the bargain. It is a good yarn but, in truth, nobody knows who he really was. In...

Danie Marais, Director of Redstor.

Safer Internet Day 2017- Redstor’s contribution

February 7, 2017 • Cloud Computing, Online & Social, Opinion, SecurityComments Off on Safer Internet Day 2017- Redstor’s contribution

Specialised cloud software and backup services provider Redstor is urging the market to unite for a better internet and support the global Safer Internet Day 2017 on Tuesday 7 February. The annual worldwide initiative is organised to encourage users of...

Left: Bruce Zhou, CEO, AXILSPOT. Right:August Chen, Director of Global Sales, AXILSPOT.

AXILSPOT looking to improve network efficiency in MEA

February 6, 2017 • Hardware, SecurityComments Off on AXILSPOT looking to improve network efficiency in MEA

AXILSPOT, a global vendor in enterprise wireless networking, has released it’s latest Dorado In-wall access points in the Middle East and Africa (MEA). The latest release will help businesses streamline their operational processes and enjoy consistent...

(image source: pixabay.com)

Fortinet extends Security Fabric into IOT

February 6, 2017 • Internet of Things, Security, Top StoriesComments Off on Fortinet extends Security Fabric into IOT

Fortinet recently announced the extension of the Fortinet Security Fabric to defend enterprises against the exponentially increasing cyber threats posed by the Internet of Things (IoT). Fortinet’s Security Fabric delivers the visibility, integration,...

1000 cyber criminals named and shamed on a new website. (pixabay.com)

Cyber criminals develop service to protect themselves from scammers

February 6, 2017 • Security, Top StoriesComments Off on Cyber criminals develop service to protect themselves from scammers

Ripper cc a platform designed to protect cyber criminals from being robbed by fellow cyber criminals has identified their 1000th culprit. Rippers rob others on the dark web and other criminal marketplaces. They often sell fake social media credentials;...

By Roy Alves, Country Manager, MEA, Axis Communications.

Top tech trends in security for 2017

January 31, 2017 • Internet of Things, Opinion, Security, Top StoriesComments Off on Top tech trends in security for 2017

Security will be a huge trend in 2017, following a number of high-profile cyber-attacks and hacks last year. With surveillance security continuing to develop as a result of breakthroughs in big data analytics, Internet of Things (IoT), and machine learning, a...

Paul Jolliffe, DSM Expert: Security at T-Systems South Africa on security posture in business transformation (image: Yu Samoilov)

Luxury hotel attacked by hackers

January 31, 2017 • Security, Top StoriesComments Off on Luxury hotel attacked by hackers

A luxury hotel in the Alps was attacked by ransomware which affected electronic room keys and guest check ins . The Romantik Seehotel Jägerwir in Austria was forced to pay cybercriminals thousands in Bitcoins to have their locking system unlocked. Being the...

The State of Application Delivery report outlines security as the top priority in adoption of app services. (Image source: Shutterstock)

Security top priority for app deployment as organisations move to cloud

January 30, 2017 • Cloud Computing, SecurityComments Off on Security top priority for app deployment as organisations move to cloud

F5 Networks announced the EMEA results of its 2017 State of Application Delivery report. The global report surveys over 2,000 IT, networking, application, and security professionals worldwide to examine the role application services play in allowing...