Simeon Tassev, MD and QSA at Galix Ransomware remains one of the top cyber threats facing businesses in South Africa and the world, causing financial, reputational and collateral damage. In addition, there is a growing trend toward cyber extortion, where data encrypted for ransomware purposes is then leaked to the public, or even used against individuals. Backup and recovery, while they remain essential, are no longer sufficient to protect businesses adequately against this threat. A more proactive approach is becoming essential, including threat hunts, which proactively search networks for cyberthreats that may be lurking undetected. Lucrative targets The threat of cyberattack is real and growing, and the likelihood of businesses being attacked is increasing daily. In fa...
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit “Cookie Settings” to provide a controlled consent.
Sumit Kumar Sharma, Enterprise Architect, In2IT Technologies. Open source is by no means a new technology, but it has matured over the past 30 plus years and with the latest wave of digital transformation, its role has become increasingly prominent. In the everyday business sense, it is still a cost-effective option for operating systems, databases, and analytical tools. However, where the nature and benefits of open source are truly being realised is in the Artificial Intelligence (AI) and machine learning spaces. The open, community-driven, and collaborative environment created by open source is the perfect ground for these new-age initiatives, fostering innovation while ensuring that there is no single entity driving the agenda around the technology that will shape our future. Still the...
Simeon Tassev, MD and QSA at Galix IT and information security are critical, but when you have multiple systems throwing out hundreds of alerts every day, it is easy to become ‘alert fatigued’. Alerts relating to real, business threats can easily be lost in the sheer volume, giving malicious attacks a gap and making your business vulnerable. Adding intelligence around this process through a threat-centric Security Operations Centre (SOC) can help businesses prioritise incidents and more easily detect higher-risk threats affecting multiple locations and systems, for improved incident response and better security. The evolution of the SOC A SOC has become essential for business today, whether this is an in-house department or delivered via a managed services partner, responsible for monitori...
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit “Cookie Settings” to provide a controlled consent.