Security

‘Father of the iPod’ helps Ledger create new cold crypto wallet

Hardware wallet provider Ledger, known for its cold-storage devices, announced its seventh crypto wallet in collaboration with the creator of the original iPod. Tony Fadell, the inventor of the iconic iPod Classic model, has partnered with Ledger to help the company design its latest wallet device known as Ledger Stax. The company broke the news on Dec. 6 at Ledger’s bi-annual Web3 developer event, Ledger Op3n, in Paris. Ledger’s upcoming new hardware wallet is a credit card-size device that features a large E Ink display, capacitive touch, Bluetooth support, wireless charging and more. For the first time in Ledger’s product line, Stax contains a curved E Ink display which can be used to show the holder’s name or other wallet information, just like a book spine. The device is a...

Cut through the clutter for proactive security with a threat-centric SOC

Simeon Tassev, MD and QSA at Galix IT and information security are critical, but when you have multiple systems throwing out hundreds of alerts every day, it is easy to become ‘alert fatigued’. Alerts relating to real, business threats can easily be lost in the sheer volume, giving malicious attacks a gap and making your business vulnerable. Adding intelligence around this process through a threat-centric Security Operations Centre (SOC) can help businesses prioritise incidents and more easily detect higher-risk threats affecting multiple locations and systems, for improved incident response and better security. The evolution of the SOC A SOC has become essential for business today, whether this is an in-house department or delivered via a managed services partner, responsible for monitori...

Information Security: Are you certified?

Image sourced from Texas News Today Information security certification is a way to validate an individual’s knowledge and skills in the area of information security. It is an important way to demonstrate one’s commitment to information security and its principles. It is also a way for employers to validate that their employees have the necessary skills and knowledge to protect their organization’s assets. Information security is a critical aspect of any business. It is essential to protect information assets from unauthorized access, disclosure, modification, and destruction. Information security certification provides assurance that an individual has the necessary knowledge and skills to protect information assets. It is also a way to ensure that the individual is knowledgeable in the are...

Cybersecurity talent in Africa: The challenges we face and the solutions we need

Conrad Steyn, CTO and Head of Engineering for Sub-Saharan Africa at Cisco Africa faces a significant challenge when it comes to the availability and distribution of cybersecurity talents and secure IT infrastructures. This is important because as the continent continues to undergo digital transformation, the need for security becomes more apparent. We have seen too many enterprises globally suffer from attacks that cost money or bring essential services to a halt. Something needs to change. Facing this challenge, as well as new business circumstances that influence how we build and maintain our IT systems, we need to understand how we got here, how the world has changed, how people are working, and the various ways we can work together to instil change and nurture the next generation of se...

Three security goals to focus on in 2023

Working in cyber security can be draining. It’s a high-pressure environment and the stakes are only getting higher. A recent report found that 45% of cybersecurity professionals have considered quitting over the constant threat of Ransomware attacks. The industry has been evangelising (or fear-mongering, depending on who you ask) on the rising threats of bad actors for years. Unfortunately, the stats don’t lie – threats are becoming more numerous and more sophisticated year after year. At the same time, the environments that need protecting are becoming more complex and decentralised, with migration to the public cloud, digital transformation and mounting pressure to roll out new products as fast as possible. A report found that last year 79% of employees admitted to sacrificing security t...

Belgium says BTC, ETH and other decentralized coins are not securities

Belgium’s financial regulatory body has confirmed its position that Bitcoin (BTC), Ether (ETH) and other cryptocurrencies that are issued solely by computer code do not constitute securities. The explanation came from Belgium’s Financial Services and Markets Authority (FSMA) in a Nov. 22 report, a draft of which was opened for comment in Jul. 2022. The clarification comes following an increase in demands for answers as to how Belgium’s existing financial laws and regulations apply to digital assets, according to the FSMA. While not legally binding under Belgium or European Union law, the FSMA stated that under its “stepwise plan,” cryptocurrencies would be classed as a security if it was issued by an individual or entity”: “If there is no issuer, as in cases where instruments are cre...

What cloud security risks mean for organizations, including yours

With the dramatic increase in cloud adoption, organizations are relying more on cloud technology than ever before. To safely embrace this shift from traditional services to the cloud, it is imperative to take necessary measures that can improve the security infrastructure of the cloud environment. With the latest advancements in IT security, cloud technology is as safe as it can be. However, organizations must be aware of the ever-present risks that coexist with the latest technologies. To understand cloud cyber risks better, take a look at some examples below. Data breaches The repercussions of data breaches are numerous. Cloud service providers must ensure that any personal and sensitive data stored in the cloud is protected against any breach or unauthorized access. To strategize its se...

Liquid C2 launches Cyber Security Fusion Centre for Kenyan businesses

Ignus De Villiers, Liquid Managing Executive Cyber Security, Adil El Youssefi, CEO Liquid Networks Rest of Africa, Ezra Chiloba, Director General Communications Authority of Kenya, Col. Evans Ombati, Director of the National Cyber Command Centre Liquid C2, a business of Cassava Technologies, a pan-African technology group, opened the doors of its first Cyber Security Fusion Centre (CSFC) in Nairobi, Kenya, making this the second centre of its kind in Africa. “Kenyan businesses have seen increased digital adoption, and the country’s connected population in early 2021 was nearly 22 million. The increased number of digitally transformed businesses and individuals means that the target pool for malicious entities is also becoming wider. As a result, we have witnessed immense interest from cust...

Ransomware Activity Doubles in Transportation and Shipping Industry

Trellix, the cybersecurity company delivering the future of extended detection and response (XDR), today released The Threat Report: November 2022 from its Advanced Research Center, home to the world’s most elite security researchers and intelligence experts. The latest report analyzes cybersecurity trends from the third quarter of 2022. “Interestingly, the trends observed in South Africa are pretty much in line with what is happening globally,” says Carlo Bolzonello, country lead for Trellix South Africa. “In the last 12 months, we have seen an uptick in activity from cybercrime actors targeting South Africans, and while the actors may be different, the attacks are the same, in terms of global presence. “South African companies are indeed taking the necessary steps to protect against cybe...

Cyber-attacks and OT – safeguard this new feeding ground

Johan Potgieter, cluster industrial software leader at Schneider Electric Before the advent of Industrial Internet of Things (IIoT), Operation Technology (OT) was safeguarded against most cyberattacks.  OT systems’ propriety nature, standards and hard-wired connectivity protected it against malicious attacks. Cyber threats and incidents are a major operating and business risk for every digital enterprise. In age the of digitisation, creating and executing a strategy that allows you to see, reduce, and respond to cyber threats and risks is critical for achieving your financial objectives. Now, we’re entering unchartered waters – the widespread integration of embedded devices and OT networks with corporate or IT infrastructure has created a new feeding ground for hackers.  Every en...

Future of Web3 security with Immunefi and Brave CEOs: The Bug House 2022

Celebrating the myriads of accomplishments earned by the crypto ecosystem, Immunefi, Electric Capital, Bitscale Capital and MA Family together hosted The Bug House — a party for bringing together the global Web3 community.  In a panel hosted by Cointelegraph, editor-in-chief Kristina Lucrezia Cornèr sat with Mitchell Amador, founder and CEO at Immunefi, and Brendan Eich, founder and CEO of Brave browser, to discuss the evolution of Web3 and its future trajectory. (From left to right) Kristina Cornèr, Mitchell Amador and Brendan Eich during The Bug House. Source: Cointelegraph “There’s a lot of Web2 in Web3. That’s a problem right now,” began Eich when asked about the ongoing Web2 to Web3 transition. From using trusted servers to sub-custody wallets, Amador believed that such Web2 site...

Web3 Foundation makes bold claim to SEC: ‘DOT is not a security. It is merely software’

The entity supporting research and development of Polkadot as well as overseeing fundraising efforts for the blockchain has argued that the United States Securities and Exchange Commission should not consider the DOT token a security under its regulatory purview. In a Nov. 4 blog post, the Web3 Foundation Team’s chief legal officer Daniel Schoenberger said Polkadot’s native token (DOT) had “morphed” and was “software” rather than a security. Schoenberger said the claim was “consistent with the views” it had shared with the SEC following discussions it began in November 2019. “While the Polkadot vision had not contemplated that the blockchain’s native token would be a security, we understood that the SEC’s view was likely to be that the to-be-delivered token would be a security, at least at...