MENU

Posts Tagged ‘cyber security’

  • Top 5 2015 Cyber Security Threat Predictions

    December 4, 2014 • Lists, Security, Top StoriesComments Off on Top 5 2015 Cyber Security Threat Predictions

    As 2015 approaches Fortinet and its threat research division FortiGuard Labs, have taken a look ahead to determine the most significant cyber security threats of the upcoming New Year – both from the perspective of a Black Hat hacker, as well as a Threat...

  • Kaspersky reveals security guide to keep data safe

    October 13, 2014 • SecurityComments Off on Kaspersky reveals security guide to keep data safe

    Security experts from Kaspersky Lab’s Global Research and Analysis Team share the security measures they use to protect their own communications via email, instant messaging tools, smartphones, and while browsing over computer networks and interacting with...

  • Get help with Rising DDoS threats

    July 28, 2014 • SecurityComments Off on Get help with Rising DDoS threats

    The number of cyber threats are growing, but most enterprises still feel unprepared to deal with them. The answer lies in expert assistance and formalised plans, says Networks Unlimited. Anton Jacobsz, Managing Director of Arbor Networks distributor Networks...

  • Cyberattacks may cost world economy $3 trillion- WEF

    January 22, 2014 • SecurityComments Off on Cyberattacks may cost world economy $3 trillion- WEF

    Failing to improve cyber security could cost the world economy dearly. This according to a new report released today by the World Economic Forum in collaboration with McKinsey & Company. The Risk and Responsibility in a Hyperconnected World report...

  • The weakest link in cyber security

    December 4, 2013 • FeaturesComments Off on The weakest link in cyber security

    Newspaper headlines that the international space station might have been compromised by a computer virus might be sensational and grab much attention, but seem far removed from everyday organsations and businesses most of us work for and with. But the...

  • Skilled ‘cyber warriors’ wanted to help South Africa fight fraud

    October 29, 2013 • Security, Southern Africa, Top StoriesComments Off on Skilled ‘cyber warriors’ wanted to help South Africa fight fraud

    With a dire lack of skills to counter South Africa’s spiralling instances of cyber fraud, it is little surprise that the country ranks third among those most targeted for cyber attacks. So claims Professor Basie von Solms, Director of the University of...

  • South Africa launches National Cyber Security Advisory Council

    October 15, 2013 • Security, Top StoriesComments Off on South Africa launches National Cyber Security Advisory Council

    South African Minister of Communications, Yunus Carrim, inaugurated the country’s first National Cyber Security Advisory Council (NCAC ) today. The role of the NCAC will be to advise the South African government on cyber security policy and technical...

  • 23 Business attitudes to IT Security

    January 8, 2013 • SecurityComments Off on 23 Business attitudes to IT Security

    You are a businessman or an expert responsible for critical decisions related to IT security, but you have a tough schedule. You are hunting for any piece of information that will illuminate the latest trends and facilitate obtaining more expertise in this...

  • Ren Zhengfei: Huawei Optimistic About Growth Prospects

    July 6, 2012 • Top StoriesComments Off on Ren Zhengfei: Huawei Optimistic About Growth Prospects

    Huawei Founder and CEO, Mr. Ren Zhengfei, has outlined Huawei’s commitment to enrich life through communications and to address the issue of cyber security challenges within the information and communications technology (ICT) industry. Mr. Ren also...

  • ISPA launches iCode to boost local cyber security

    May 3, 2012 • Mobile and Telecoms, Top StoriesComments Off on ISPA launches iCode to boost local cyber security

    South Africa’s Internet Service Providers’ Association (ISPA) today announced it would lead the development of a new voluntary code of practice to improve cyber security for end-users. Known as the icode, and developed in conjunction with...

  • The motivations behind recent Android malware

    November 30, 2011 • FeaturesComments Off on The motivations behind recent Android malware

    For years now, we in the cyber security industry have been saying an explosion of mobile malware is just around the corner. Beginning in earnest this year, we have indeed observed a marked increase in threats targeting mobile devices – particularly the...

  • Protecting vital info assets demands cyber approach

    September 29, 2011 • SecurityComments Off on Protecting vital info assets demands cyber approach

    Despite increasing concerns about the safeguarding of vital corporate and client information databases and a global drive towards stronger regulation regarding privacy, the vast majority of businesses have only limited capabilities in place to detect and...

  • Spear phishing – know the facts and don’t get caught

    March 1, 2011 • FeaturesComments (2)

    Most internet users are aware of the very common phishing attacks, blanket emails sent out en masse with links to infected sites that try to gather your personal information, and have taken the necessary steps to protect themselves from this and other cyber...