MENU

Security
Category

10 Things HR professionals need to do before the GDPR comes into force

10 Things HR professionals need to do before the GDPR comes into force

May 23, 2018 • Opinion, SecurityComments (0)

There are only 3 days until the General Data Protection Regulation (GDPR) comes into force, which will govern the levels of protection and privacy for all individuals. It represents one of the biggest shakeups as to how personal data should be handled. As gatekeepers and processors of personal data, HR and People teams have a [&hellip...

Read More
Edward Carbutt, Executive Director at Marval Africa

Five critical elements to protect your business against cybercrime

May 23, 2018 • SecurityComments (0)

In the wake of last year’s surge of debilitating ransomware attacks, many businesses are investing heavily in cybersecurity technology, with Gartner predicting that worldwide security spending will reach unprecedented highs at an estimated $96 Billion this...

Google's Chrome should be secure following their security patch.

Google Chrome to remove the ‘Secure’ button

May 21, 2018 • Online & Social, SecurityComments (0)

Google’s Chrome browser will see the removal of the “Secure” indicator in the web address bar as more websites adopt HTTPS. But users of the browser will see a flashing red “not secure” if the site is uncertified. Chrome users will...

Kenya to host continental summit on cyber security

Kenya to host continental summit on cyber security

May 20, 2018 • East Africa, Events, SecurityComments (0)

Kenya is set to host the first African Cyber Defense Summit in July this year, to develop strategies to respond to cybersecurity threats in the continent. Information, Communication and Technology (ICT) Cabinet Secretary Joe Mucheru said the continental...

A comprehensive security strategy needs to reflect the interdependence of physical and virtual security

Securing the utility’s most valuable resources

May 20, 2018 • SecurityComments (0)

Managing crises when they hit is something that all utility companies have to deal with. Adverse weather, natural disaster or vandalism etc. can all wreak havoc. How a power company or utility responds and recovers is critical to their business continuity and...

Kaspersky Lab moves core processes to Switzerland in the name of transparency

Kaspersky Lab moves core processes to Switzerland in the name of transparency

May 19, 2018 • Security, Top StoriesComments (0)

Kaspersky Lab is adapting its infrastructure to move a number of core processes from Russia to Switzerland after allegations of espionage sprung up. After the US government and other parties accused it of spying on customers at the Russian state’s...

WannaCry, the dawn of a new generation of cyber-attacks

WannaCry, the dawn of a new generation of cyber-attacks

May 18, 2018 • Security, Top StoriesComments (0)

A year ago, after multiple days of digital bombardment, the cyber-security world changed forever. Over one weekend, the notorious ransomware attack that would become widely known as WannaCry infected more than 200,000 machines around the world, causing...

GDPR is here: 9 ways technology can help get ready for it

GDPR is here: 9 ways technology can help get ready for it

May 18, 2018 • Big Data, SecurityComments (0)

Shorthand for the General Data Protection Regulation, this is a benchmark law aimed at tightening data control around personal data involving EU citizens. Not complying with GDPR can see a company excluded from any European business, while companies found in...

What You Should Know About Social Hacking…(and how to guard against it!)

What You Should Know About Social Hacking…(and how to guard against it!)

May 18, 2018 • Opinion, SecurityComments (0)

For both businesses and individuals, the dark threat of cybercrime is ever present – and increasingly comes disguised in many forms. In 2017, global businesses were badly hit by ransomware, a type of malware that leaves IT professionals and business leaders...

Cyber-criminals are turning their attention to the supply chain as a new means to exploit business data

Troye proactively addresses security threats

May 18, 2018 • SecurityComments (0)

Local managed IT services provider, Troye, is proactively helping its clients defend against external and insider security threats and is helping mitigate phishing attacks and loss of data due to malicious behaviour. With the imminent enforcement of PoPI and...

Google urges Android device-makers to roll out OS security patches regularly

Google to require Android device-makers to roll out OS security patches regularly

May 17, 2018 • Security, Top StoriesComments (0)

Google has announced, albeit without going into much detail, that it will require the manufacturers of Android devices to push out regular security-focused updates. The announcement came from the head of Android security at Google, David Kleidermacher, during...

Cybersecurity should be a foundational component of digital strategies says Cisco

Cybersecurity should be a foundational component of digital strategies says Cisco

May 17, 2018 • Security, Top StoriesComments (0)

It is time for a new approach to security. Today’s dynamic threat landscape demands a security strategy that focuses on the threat itself more than simply prevention. One that doesn’t continue to simply stick band-aid over band-aid, until a cat’s cradle...

Enhances security without hindering productivity with its touchless technology

Jasco rolls out Biometric access control system

May 17, 2018 • SecurityComments (0)

Jasco has installed a state of the art access control solution from its own Security portfolio, the Touchless Biometric (TBS) Access Control System, at its Head Office in Midrand. The system was deployed in under two months (including enrolling all employees...

Building resilience against distributed threats at government level

Building resilience against distributed threats at government level

May 16, 2018 • Security, Sponsored, Top StoriesComments (0)

There’s no doubt that the United States is taking Distributed Denial of Service (DDoS) attacks seriously. In point of fact, the Secretary of Commerce and the Secretary of Homeland Security posted a draft report on 5 January this year, entitled ‘A Report...

Thomson Reuters launches Media Check to fight against financial crime

Thomson Reuters launches Media Check to fight against financial crime

May 15, 2018 • SecurityComments (0)

Thomson Reuters has enhanced its World-Check One platform with the launch of Media Check, a unique media screening and processing feature powered by artificial intelligence (AI) that helps address the regulatory and reputational consequences of overlooking...

Sherry Zameer - Senior Vice President Internet of Things Solutions, CIS, Middle East and Africa region, Gemalto

Gemalto strengthens trust in smart energy with its new end-to-end security solution

May 15, 2018 • Mining & Energy, SecurityComments (0)

Gemalto, the world leader in digital security, is strengthening trust in the smart energy sector with an end-to-end security solution which protects the entire ecosystem. Deployed by smart meter makers and distribution systems operators, the offer provides...