Zimbabwean Army Prepared For Cyber Warfare

The Zimbabwean army is ready to deal with those using the internet to destabilise the southern African country, the state-owned Herald newspaper reported.

Zimbabwe National Army commander, Lieutenant-General Phillip Valerio Sibanda, warned they were training their officials to detect and deal with internet threats.

“As an army, at our institution of training, we are training our officers to be able to deal with this new threat we call cyber warfare, where weapons, not necessarily guns, but basically information and communication technology, are being used to mobilise people to do wrong things. We will be equal to the task when the time comes,” Sibanda was quoted as saying.

The country has in recent months been hit by a wave of protests, as Zimbabweans demand that the government deal with the ongoing economic decline.

On July 6, the country came to an abrupt standstill as Zimbabweans downed tools, demanding better services. Many businesses, shops, schools, government departments and courts were closed. Public transport came to standstill. The protests were reportedly organised through social media networks like Twitter, Facebook, and WhatsApp.

A cleric in the southern part of the country galvanised thousands of Zimbabweans to stand up against the malfunctioning government of longtime ruler Robert Mugabe through a video he posted on his Facebook page in May.

Baptist pastor Evan Mawarire, 39, unwittingly began the This Flag movement when he expressed his frustration at the state of his nation, wearing the Zimbabwean flag around his neck.

Since then, a number of other social media movements have sprung up throughout the country.

This resulted in the ruling Zanu-PF government accusing the governments of Britain, United States of America, and France of interfering in the country’s internal affairs.

Ein News:  http://bit.ly/2aTWbWJ

« Internet of Things Will Turn Hacks Into Disasters
$5m Damages Payout For Huge Healthcare Data Breach »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

CERT-SE

CERT-SE

CERT-SE is the national and governmental Computer Security Incident Response Team of Sweden.

Code Dx

Code Dx

Code Dx is a software application vulnerability correlation and management system.

Morphisec

Morphisec

Morphisec's world leading prevention-first software stops ransomware and other advanced attacks from endpoint to the cloud.

SRI International

SRI International

SRI International is a research institute performing client-sponsored R&D in a broad range of study areas including computing and cybersecurity.

Wipro

Wipro

Wipro Limited is a leading global information technology, consulting and business process services company.

Blaze Information Security

Blaze Information Security

Blaze Information Security is a privately held, independent information security firm born from years of combined experience and international presence.

Absolute IT Asset Disposals

Absolute IT Asset Disposals

Absolute IT Asset Disposals is an IT asset disposal (ITAD) company providing safe and secure recycling of IT assets.

Cypress Data Defense

Cypress Data Defense

Cypress Data Defense helps clients build secure applications by providing training, best practices, and evaluating security during every stage of the Secure Application Development Lifecycle.

Atakama

Atakama

With Atakama, data remains encrypted until the very moment it is used, and the ability to decrypt is based on zero trust architecture.

Neosec

Neosec

We’re reinventing API security. Understanding behavior requires data, analytics, and intelligence. Neosec brings XDR techniques to application security.

Delinea

Delinea

Delinea is a leading provider of cloud-ready privileged access management (PAM) solutions that empower cybersecurity for the modern, hybrid enterprise.

Zuul IoT

Zuul IoT

Zuul take an asset-centric approach to OT security, enabling security teams to protect the critical IIoT/IoT devices that are at the foundation of critical business functions.

Ibento Global

Ibento Global

Ibento organises the CyberX series of cybersecurity conferences.

Responsive Technology Partners

Responsive Technology Partners

Responsive Technology Partners provides superior IT support services including cybersecurity and compliance, telephony, cloud services, cabling, access control, and camera systems.

Rhymetec

Rhymetec

Rhymetec are an industry leader in cloud security, providing innovative cybersecurity and data privacy services to the modern-day SaaS business.

Eviden

Eviden

Eviden is an Atos business that brings together its digital, big data and security business lines. It will be a global leader in data-driven, trusted and sustainable digital transformation.