How to find a ‘super hacker’

How to find a ‘super hacker’

It doesn’t matter how careful they are, ‘super hackers’ will leave a trace of their activities. Windows event logs, DNS logs and DHCP logs – sources not normally analysed from an attack detection perspective – all hold clues to the clandestine...
Unlocking the door to comprehensive security

Unlocking the door to comprehensive security

By Ralph Berndt, Director, Sales and Marketing, Syrex. South African organisations must assess their security footprints to ensure they are prepared for the worst. And the worst is here – the 2015 IBM Cost of Data Breach Study found that the consolidated total cost of...
Forget smart city – think smart citizen

Forget smart city – think smart citizen

By Dave Stevens, Head: Customer & Data Insights By 2050, it’s expected that nearly 80% of South Africans will be living in urban areas. This massive acceleration in rural-to-urban migration was highlighted recently by Co-operative Governance and Traditional...
Staff: When vibration meets innovation

Staff: When vibration meets innovation

By Georgina Barrick, ADvTECH Resourcing I recently came across a blog post called “Fear Cultures: Do Scared People Innovate?”, which spoke to business leaders about creating workplaces that enable all staff members to feel like they can participate in discussion and...