ATO attacks occur when an attacker gains unauthorised access to a victim’s online account, usually by stealing their login credentials.
The vulnerability could have exposed potentially compromising security information about Mend.io customers.
Each technology that’s integrated in your IT environment must be compliant with security standards, says Altron Document Solutions.
Next-generation methodologies are required to deliver effective threat prevention in an era of unprecedented attacker activity, says iSSC Group.
The department says measures have been put in place to ensure the state information is not compromised.
Zero trust architectures provide an alternative approach to cyber security by focusing on identifying and protecting critical resources.
Symantec Enterprise Cloud uncovers and informs customers of about 100 000 new targeted attacks every single month says CA Southern Africa.
To pass, at least 85% of phishing sites had to be detected and blocked with no false alarms on the 250 legitimate sites.
A growing percentage of face biometric technology incorporates some form of liveness checks – such as wink and blink – to verify and authenticate customers.
In a fast-evolving risk environment, traditional DIY and MSSP models are proving costly, complex and incomplete, says Arctic Wolf South Africa.
Cyber insurers’ terms, conditions and specifications around best practice risk mitigation are likely to get tougher in future, says InfoTech CEO Mauritz du Toit.