Redwoods cybersecurity culture or what we can learn from those forests

Redwoods, also known as Sequoioideae, include the largest and tallest trees in the world. That is fine, some of you might argue, but what it has to do with cybersecurity? A lot, we would say. The latest cybersecurity attacks – such as the one on the Transnet in South Africa – once again confirmed the …

Continue reading Redwoods cybersecurity culture or what we can learn from those forests

Cybersecurity fatigue: SAT is dead – long live SAT!

The wider American public was afforded an unwanted glimpse into the Wild West world of ransomware this week, after a cyber-attack crippled Colonial Pipeline, causing fuel shortages across the eastern seaboard and states of emergency to be declared in four states, reports The Guardian. The latest ransomware attack on the US Colonial Pipeline has sparked …

Continue reading Cybersecurity fatigue: SAT is dead – long live SAT!

Cloud, Edge and IoT trichotomy: cybersecurity concerns

The cybersecurity issues of the Cloud, Edge and IoT trichotomy are inevitably related to all of these complementary technologies. Cloud Computing is the delivery of on-demand computing services without direct active management by the user. These services range from applications to storage and processing power obtained from the remote data centres and available large number …

Continue reading Cloud, Edge and IoT trichotomy: cybersecurity concerns

Cybersecurity quandary: Is the third party betraying us?

The survey concludes that although nearly 80% of respondents believe software supply chain attacks have the potential to become one of the biggest cyber threats over the next three years. Few organizations are, however, prepared to mitigate the risks. Is, then, a third party betraying us or we are just inattentive? This issue must, anyway, …

Continue reading Cybersecurity quandary: Is the third party betraying us?

5G security: Is the cheese already moved?

With 5G just around the corner, it seems that people are struggling to understand all its facets - including cybersecurity. The 5G brings far-reaching changes, significantly different from previous generations of mobile communication networks as it will cause major modifications in technology and network architecture. This architecture will connect an enormous volume of the internet …

Continue reading 5G security: Is the cheese already moved?

Weak cybersecurity can make benefits of the 4IR null and void

Raising cybersecurity awareness designates a necessary step in successfully addressing cybersecurity issues of the 4th Industrial Revolution and forming ‘cyber intelligent’ leadership, workforce and citizenry. The backdrop Almost all organisations in the future will be digital, and 60% of all global GDP will come from digital sources by 2022, according to the World Economic Forum …

Continue reading Weak cybersecurity can make benefits of the 4IR null and void

Habituation as cybersecurity nightmare and panacea

A number of studies confirmed that people often have a tendency to find ways to work around organisational cybersecurity policies. This     is actually not something that they    do on purpose but rather based on their habits. In other words, this behaviour is an effect of bad habituation. Achieving individual objectives and finding the way of …

Continue reading Habituation as cybersecurity nightmare and panacea