Using AI to fight the insider threat

Darktrace uses AI to detect machines that may be conducting nefarious business, even if they have legitimate access.

DDoS used to oust competition in crypto market

7 hours ago

Cyber criminals are now using distributed denial-of-service attacks to target crypto-currencies.

Lessons from next-gen approach to user authentication

Enterprises have a lot to learn from user experience in the consumer identity management space, says Ubusha's Andrew Whittaker.

Shift from 'high wall' to 'body armour' security

11 hours ago

The ITWeb/VMware survey reveals a trend towards securing y being put around every object within the data centre. WannaCry had a knock-on effect and changed security postures for many organisations.

Bringing the C-level on board with cyber security

Cyber security is an enterprise-wide risk management issue, not just an IT issue, said Rand Water's Vincent Mello.

Endpoints the new frontier in security battle

Yesterday

Over half of successful cyber attacks are on endpoints, says Jeremy Matthews, Panda Security Africa.

POPI set to be a 'rude awakening' for SA businesses

The industry watchdog will be looking to make an impact when the legislation finally comes into force, says Webber Wentzel.

Illegal crypto-currency miners pocket $100m to date

We can expect an increase in malicious coin miners, driven by the prospect of financial gains and increased anonymity, says Helge Husemann of Malwarebytes.

Africa's limited data protection laws heighten GDPR significance

A lot of countries on the continent have no data protection legislation whatsoever, warns Deloitte's data privacy specialist.

Hacking the machine, at ITWeb's Security Summit

Teams of keen young coders are hunkered down in Midrand, using machine learning to solve real world business cases.

One user, one e-mail can bring down a company

Yesterday

Too many organisations still neglect the security basics in the face of increasing risks of ransomware attacks.

Beware of 'blinded random block corruption' attacks

Very few systems offer memory encryption, which makes them vulnerable to attack, says Intel's Rodrigo Branco