Home » Security » Page 3

Security

Information Security: Are you certified?

Image sourced from Texas News Today Information security certification is a way to validate an individual’s knowledge and skills in the area of information security. It is an important way to demonstrate one’s commitment to information security and its principles. It is also a way for employers to validate that their employees have the necessary skills and knowledge to protect their organization’s assets. Information security is a critical aspect of any business. It is essential to protect information assets from unauthorized access, disclosure, modification, and destruction. Information security certification provides assurance that an individual has the necessary knowledge and skills to protect information assets. It is also a way to ensure that the individual is knowledgeable in the are...

Cybersecurity talent in Africa: The challenges we face and the solutions we need

Conrad Steyn, CTO and Head of Engineering for Sub-Saharan Africa at Cisco Africa faces a significant challenge when it comes to the availability and distribution of cybersecurity talents and secure IT infrastructures. This is important because as the continent continues to undergo digital transformation, the need for security becomes more apparent. We have seen too many enterprises globally suffer from attacks that cost money or bring essential services to a halt. Something needs to change. Facing this challenge, as well as new business circumstances that influence how we build and maintain our IT systems, we need to understand how we got here, how the world has changed, how people are working, and the various ways we can work together to instil change and nurture the next generation of se...

Three security goals to focus on in 2023

Working in cyber security can be draining. It’s a high-pressure environment and the stakes are only getting higher. A recent report found that 45% of cybersecurity professionals have considered quitting over the constant threat of Ransomware attacks. The industry has been evangelising (or fear-mongering, depending on who you ask) on the rising threats of bad actors for years. Unfortunately, the stats don’t lie – threats are becoming more numerous and more sophisticated year after year. At the same time, the environments that need protecting are becoming more complex and decentralised, with migration to the public cloud, digital transformation and mounting pressure to roll out new products as fast as possible. A report found that last year 79% of employees admitted to sacrificing security t...

Belgium says BTC, ETH and other decentralized coins are not securities

Belgium’s financial regulatory body has confirmed its position that Bitcoin (BTC), Ether (ETH) and other cryptocurrencies that are issued solely by computer code do not constitute securities. The explanation came from Belgium’s Financial Services and Markets Authority (FSMA) in a Nov. 22 report, a draft of which was opened for comment in Jul. 2022. The clarification comes following an increase in demands for answers as to how Belgium’s existing financial laws and regulations apply to digital assets, according to the FSMA. While not legally binding under Belgium or European Union law, the FSMA stated that under its “stepwise plan,” cryptocurrencies would be classed as a security if it was issued by an individual or entity”: “If there is no issuer, as in cases where instruments are cre...

What cloud security risks mean for organizations, including yours

With the dramatic increase in cloud adoption, organizations are relying more on cloud technology than ever before. To safely embrace this shift from traditional services to the cloud, it is imperative to take necessary measures that can improve the security infrastructure of the cloud environment. With the latest advancements in IT security, cloud technology is as safe as it can be. However, organizations must be aware of the ever-present risks that coexist with the latest technologies. To understand cloud cyber risks better, take a look at some examples below. Data breaches The repercussions of data breaches are numerous. Cloud service providers must ensure that any personal and sensitive data stored in the cloud is protected against any breach or unauthorized access. To strategize its se...

Liquid C2 launches Cyber Security Fusion Centre for Kenyan businesses

Ignus De Villiers, Liquid Managing Executive Cyber Security, Adil El Youssefi, CEO Liquid Networks Rest of Africa, Ezra Chiloba, Director General Communications Authority of Kenya, Col. Evans Ombati, Director of the National Cyber Command Centre Liquid C2, a business of Cassava Technologies, a pan-African technology group, opened the doors of its first Cyber Security Fusion Centre (CSFC) in Nairobi, Kenya, making this the second centre of its kind in Africa. “Kenyan businesses have seen increased digital adoption, and the country’s connected population in early 2021 was nearly 22 million. The increased number of digitally transformed businesses and individuals means that the target pool for malicious entities is also becoming wider. As a result, we have witnessed immense interest from cust...

Ransomware Activity Doubles in Transportation and Shipping Industry

Trellix, the cybersecurity company delivering the future of extended detection and response (XDR), today released The Threat Report: November 2022 from its Advanced Research Center, home to the world’s most elite security researchers and intelligence experts. The latest report analyzes cybersecurity trends from the third quarter of 2022. “Interestingly, the trends observed in South Africa are pretty much in line with what is happening globally,” says Carlo Bolzonello, country lead for Trellix South Africa. “In the last 12 months, we have seen an uptick in activity from cybercrime actors targeting South Africans, and while the actors may be different, the attacks are the same, in terms of global presence. “South African companies are indeed taking the necessary steps to protect against cybe...

Cyber-attacks and OT – safeguard this new feeding ground

Johan Potgieter, cluster industrial software leader at Schneider Electric Before the advent of Industrial Internet of Things (IIoT), Operation Technology (OT) was safeguarded against most cyberattacks.  OT systems’ propriety nature, standards and hard-wired connectivity protected it against malicious attacks. Cyber threats and incidents are a major operating and business risk for every digital enterprise. In age the of digitisation, creating and executing a strategy that allows you to see, reduce, and respond to cyber threats and risks is critical for achieving your financial objectives. Now, we’re entering unchartered waters – the widespread integration of embedded devices and OT networks with corporate or IT infrastructure has created a new feeding ground for hackers.  Every en...

Future of Web3 security with Immunefi and Brave CEOs: The Bug House 2022

Celebrating the myriads of accomplishments earned by the crypto ecosystem, Immunefi, Electric Capital, Bitscale Capital and MA Family together hosted The Bug House — a party for bringing together the global Web3 community.  In a panel hosted by Cointelegraph, editor-in-chief Kristina Lucrezia Cornèr sat with Mitchell Amador, founder and CEO at Immunefi, and Brendan Eich, founder and CEO of Brave browser, to discuss the evolution of Web3 and its future trajectory. (From left to right) Kristina Cornèr, Mitchell Amador and Brendan Eich during The Bug House. Source: Cointelegraph “There’s a lot of Web2 in Web3. That’s a problem right now,” began Eich when asked about the ongoing Web2 to Web3 transition. From using trusted servers to sub-custody wallets, Amador believed that such Web2 site...

Web3 Foundation makes bold claim to SEC: ‘DOT is not a security. It is merely software’

The entity supporting research and development of Polkadot as well as overseeing fundraising efforts for the blockchain has argued that the United States Securities and Exchange Commission should not consider the DOT token a security under its regulatory purview. In a Nov. 4 blog post, the Web3 Foundation Team’s chief legal officer Daniel Schoenberger said Polkadot’s native token (DOT) had “morphed” and was “software” rather than a security. Schoenberger said the claim was “consistent with the views” it had shared with the SEC following discussions it began in November 2019. “While the Polkadot vision had not contemplated that the blockchain’s native token would be a security, we understood that the SEC’s view was likely to be that the to-be-delivered token would be a security, at least at...

It’s time to turn your employees into ‘human firewalls’

Yaron Assabi, CEO of Founder of Digital Resilience Cyber-security education, through the use of anti-phishing training programs, is vital in a world where humans remain the weakest link in the cyber-security chain. Cyber-security is a term on every businessperson’s mind, as the legal, financial and reputational implications of a breach are massive. The challenge is that, while a company can implement the best cyber-security technologies, the biggest threat to a firm remains its people, who are susceptible to social engineering, phishing and many other cyber-threats. This means that the best approach to security lies in delivering relevant training that can turn your people into ‘human firewalls’. According to David Shipley CEO of Beauceron Security, one of Digital Resilience’s key security...

Solving the People Problem in Cybersecurity

After 25 years of experience in IT, including 17 years of experience in the information security industry and, having filled many diverse roles, George-Paul de Lange, founder and CEO of Cyber Intelligent Systems, noticed a big demand for cybersecurity skills development on the African continent. In his own words, “Whilst automation, machine learning, and AI have helped us to address the data problem in cybersecurity, the shortage of skilled professionals has been overlooked and underestimated, and it has come back to bite us.” African organisations need people with demonstratable practical hands-on skills, knowledge, and abilities, and this will take time to develop. And, while the cybersecurity space needs practical skills, it also needs certified individuals that understand the regulatio...