Working in cyber security can be draining. It's a high-pressure environment and the stakes are only getting higher. A recent report found that 45% of cybersecurity professionals have considered quitting over the constant threat of Ransomware attacks.
The industry has been evangelising (or fear-mongering, depending on who you ask) on...
With the dramatic increase in cloud adoption, organizations are relying more on cloud technology than ever before. To safely embrace this shift from traditional services to the cloud, it is imperative to take necessary measures that can improve the security infrastructure of the cloud environment. With the latest advancements...
Liquid C2, a business of Cassava Technologies, a pan-African technology group, opened the doors of its first Cyber Security Fusion Centre (CSFC) in Nairobi, Kenya, making this the second centre of its kind in Africa.
"Kenyan businesses have seen increased digital adoption, and the country's connected population in early 2021...
Trellix, the cybersecurity company delivering the future of extended detection and response (XDR), today released The Threat Report: November 2022 from its Advanced Research Center, home to the world’s most elite security researchers and intelligence experts. The latest report analyzes cybersecurity trends from the third quarter of 2022.
“Interestingly, the...
Before the advent of Industrial Internet of Things (IIoT), Operation Technology (OT) was safeguarded against most cyberattacks. OT systems’ propriety nature, standards and hard-wired connectivity protected it against malicious attacks.
Cyber threats and incidents are a major operating and business risk for every digital enterprise. In age the of digitisation,...
Cyber-security education, through the use of anti-phishing training programs, is vital in a world where humans remain the weakest link in the cyber-security chain.
Cyber-security is a term on every businessperson’s mind, as the legal, financial and reputational implications of a breach are massive. The challenge is that, while a...
After 25 years of experience in IT, including 17 years of experience in the information security industry and, having filled many diverse roles, George-Paul de Lange, founder and CEO of Cyber Intelligent Systems, noticed a big demand for cybersecurity skills development on the African continent. In his own words,...
How do cybercriminals think when they enter into your organisation? What do they look for? And how can you use this insight to protect your business?
Hackers want in. They want into the business, its data and its details because cybercrime is a multi-billion-dollar business and there is plenty of...
Covid-19 was a boon to perpetrators of commercial identity theft around the world. The Global Consumer Pulse Study reports that 37% of South African consumers have recently been targets of Covid-19 related digital fraud. TransUnion reports that the percentage of suspected fraudulent digital transaction attempts against businesses that originate...
One significant finding published in our 1H 2022 FortiGuard Labs Threat Report is that ransomware is rampant. We’re seeing ransomware attacks becoming more sophisticated and aggressive, with attackers introducing new strains and updating, enhancing, and reusing old ones. What’s especially concerning as we look back at the first half...
HP Inc today announced enhancements to its HP Wolf Security endpoint protection portfolio, with the launch of Sure Access Enterprise (SAE). SAE protects users with rights to access sensitive data, systems, and applications. It prevents attackers from hi-jacking these privileged sessions – even if the users’ endpoint device is...
The launch of Vulnerability Remediation-as-a-Service (vRaaS) by cybersecurity solutions provider 2TS combines the use of an international industry-leading vulnerability management solution, together with unified endpoint management technologies, to detect and remediate vulnerabilities within your IT environment. At the same time, this offering is available across the board, for both...
Ransomware attacks are real, ever-present and wreaking havoc across the board for businesses. The bad news is that this type of cybercrime does not just target large multinationals. In fact, these are most likely avoided as an attack is expected, making SMEs a much easier target. Gilchrist Mushwana, Director...
One of the biggest challenges facing any CISO today is a term we call end user revolt – when users circumvent all security measures and protocols in order to do their jobs.
When the business puts mechanisms in place to secure its infrastructure but these hinder users from being productive,...
A recent global Kaspersky study on the behaviour of small and medium businesses during crises shows staff reductions may cause additional cybersecurity risks. Yet only 51% of organisations’ leaders are confident that their ex-employees don’t have access to company data stored in cloud services, and just 53% are sure...
Kaspersky researchers discovered a new malicious version of a popular WhatsApp messenger mod dubbed YoWhatsApp. Popular for having features that the official app does not offer, this mod spreads the notorious Triada mobile Trojan, which can download other Trojans, issue paid subscriptions, and even steal WhatsApp accounts. Users around...