subscribe: Daily Newsletter

 

BT, Symantec enhance network protecti...

BT and Symantec has announced the integration of Symantec’s latest technology into BT’s portfolio of...

posted on: Feb 20, 2017 | author: Allan Davison

Mimecast combats internal email threa...

Mimecast has introduced the latest capability of its Targeted Threat Protection service, Internal Email Protect, the...

posted on: Feb 16, 2017 | author: Allan Davison

Trend Micro TippingPoint adds machine...

Trend Micro has announced the latest enhancements to its network defense solutions, leveraging the company’s...

posted on: Feb 15, 2017 | author: Allan Davison

Kaspersky Lab debuts Kaspersky Operat...

KasperskyOS is a specialised operating system designed for embedded systems with strict cybersecurity requirements....

posted on: Feb 15, 2017 | author: Allan Davison

Sophos positioned in Leaders’ Q...

Gartner has once again positioned Sophos as a Leader in the Gartner Magic Quadrant for Endpoint Protection Platforms...

posted on: Feb 14, 2017 | author: Allan Davison

Kaspersky leads in Endpoint Protectio...

Kaspersky Lab has been positioned in the “Leaders” quadrant of the 2017 Gartner Magic Quadrant for...

posted on: Feb 14, 2017 | author: Allan Davison

F5 announces application security sol...

F5 has announced a portfolio of security solutions to provide new levels of visibility and control in an ever-evolving...

posted on: Feb 13, 2017 | author: Allan Davison

ESET boosts defences as ransomware mo...

ESET is strengthening its defenses against ransomware and has added Ransomware Shield, another layer protection, to...

posted on: Feb 13, 2017 | author: Allan Davison

Fortinet extends security fabric to I...

Fortinet announced the extension of the Fortinet Security Fabric to defend enterprises against the exponentially...

posted on: Feb 8, 2017 | author: Allan Davison

Kaspersky protects FIDE and the World...

Modern-day chess is a sport that combines human excellence with mathematical accuracy and computer analysis like no...

posted on: Feb 7, 2017 | author: Allan Davison

Redstor rallies to fight ransomware

Ransomware attacks are becoming more prevalent and end users within small-to-medium business segment and education are...

posted on: Feb 6, 2017 | author: Allan Davison

Sophos debuts phishing attack simulat...

Sophos has launched Sophos Phish Threat, an advanced phishing attack simulator and training solution that is fully...

posted on: Feb 3, 2017 | author: Allan Davison

Staying secure in the mobile-first, c...

The operating environment for organisations of all sizes has changed as a result of technology trends such as cloud...

posted on: Feb 23, 2017 | author: Allan Davison

Security and IoT: can they be compati...

Robert Miller, head of operational technology at MWR InfoSecurity, unpacks the topic of security in the Internet of...

posted on: Feb 16, 2017 | author: Allan Davison

No shame in IT security breaches

One of the first steps to addressing a public health crisis is taking the shame out of it, writes Matthew Gardiner,...

posted on: Feb 8, 2017 | author: Allan Davison

Ambidextrous security posture enables...

As businesses face mounting pressure to evolve everything in their organisation – from technology, to processes,...

posted on: Feb 7, 2017 | author: Allan Davison

Avoidance a tool in fight against cyb...

Cyber-crime will become an increasingly common threat to South African companies and individuals, according to Grant...

posted on: Feb 3, 2017 | author: Allan Davison

Being proactive to protect goods in t...

The transport and logistics sector faces a unique challenge when it comes to securing goods end-to-end throughout the...

posted on: Feb 3, 2017 | author: Allan Davison

Cybercrimes Bill – much better ...

Lucien Pierce, consultant at BDO Cyber Lab, unpacks the new Cybercrimes and Cybersecurity Bill and offers his...

posted on: Jan 25, 2017 | author: Allan Davison

Uncloaking corruption within encrypti...

Encryption is an effective weapon against cybercrime, writes Martin Walshaw, senior engineer at F5 Networks. Securing...

posted on: Jan 20, 2017 | author: Allan Davison

Tallying the ripple costs of a cyber ...

The cost of any type of theft is often a lot higher than just the value of the stolen goods, writes Doros...

posted on: Jan 19, 2017 | author: Allan Davison

Trend Micro TippingPoint launches 100...

Trend Micro has announced the availability of the latest Trend Micro TippingPoint NX Series next-generation intrusion...

posted on: Jan 18, 2017 | author: Allan Davison

Fortinet musters defence against Blac...

A well-known characteristic of criminals in any space is that they are unpredictable. They look for holes and...

posted on: Jan 17, 2017 | author: Allan Davison

Your smart home: attacker or alibi?

David Emm, principal security researcher at Kaspersky Lab, examines some of the issues around smart homes At the end...

posted on: Jan 10, 2017 | author: Allan Davison

« Previous Entries