subscribe: Daily Newsletter

 

100% success for Kaspersky’s An...

With every fourth business globally experiencing a targeted attack in the last 12 months, the need for organisations...

posted on: Aug 17, 2017 | author: Allan Davison

Santam Safety Ideas winners make secu...

A cost-effective security system for low income families from Jonga is set to change the lives of township residents...

posted on: Aug 16, 2017 | author: Allan Davison

Kaspersky launches Endpoint Security ...

Kaspersky Lab has completed the integration and certification of Kaspersky Endpoint Security for Business with...

posted on: Aug 15, 2017 | author: Allan Davison

F5 leads in Web Application Firewalls

F5 Networks has been positioned by Gartner in the Leaders quadrant of its Magic Quadrant for Web Application Firewalls...

posted on: Aug 15, 2017 | author: Allan Davison

Kaspersky Lab holds cybersecurity act...

Kaspersky Lab, in partnership with Active Education, have embarked on a series of interactive cybersecurity roadshows...

posted on: Aug 3, 2017 | author: Allan Davison

Fortinet is a leader in Gartner Magic...

Fortinet has been recognized as a Leader in the 2017 Gartner Magic Quadrant for Enterprise Network Firewalls. The...

posted on: Aug 3, 2017 | author: Allan Davison

Biometric entrance system locks in va...

When it comes to access control for businesses, one of the most effective identification technologies available is...

posted on: Aug 2, 2017 | author: Allan Davison

Kids online safety: do you have quest...

Parents are naturally very busy – juggling work, life and looking after their families, with a key focus on...

posted on: Jul 31, 2017 | author: Allan Davison

Bridge the ‘gap of grief’...

A business-driven security architecture has been unveiled by RSA, a Dell Technologies business, offering a new...

posted on: Jul 26, 2017 | author: Allan Davison

ACaaS catching on as Iot prevails

South Africa is starting to realise the importance of Access Control as a Service (ACaaS). Speaking at the recent...

posted on: Jul 26, 2017 | author: Allan Davison

Bitdefender debuts cross-platform upd...

Bitdefender, the innovative security solutions provider, has released its 2018 consumer line which includes Antivirus...

posted on: Jul 24, 2017 | author: Allan Davison

Sophos placed in UTM Leaders Quadrant

Sophos has once again been positioned in the “Leaders” quadrant of Gartner’s “Magic Quadrant...

posted on: Jul 19, 2017 | author: Allan Davison

The future of ransomware

Many businesses and individuals have been affected by the various cyber-attacks perpetrated in the past six...

posted on: Aug 16, 2017 | author: Allan Davison

SA operational technologies open to a...

South African operational Industrial Control System (ICS) /SCADA systems are becoming increasingly intelligent and...

posted on: Aug 15, 2017 | author: Allan Davison

The rise of security as a service

The constant evolution of the global security threat landscape is playing a part in the rise of cyber ‘security as a...

posted on: Aug 15, 2017 | author: Allan Davison

Can industrial security drive ops, pr...

With so many moving parts, industrial and manufacturing concerns have a broader risk profile, writes Neil Cameron,...

posted on: Aug 11, 2017 | author: Allan Davison

Cybersecurity in an the era of interc...

Within the modern business environment, employees can communicate and collaborate with customers and colleagues from...

posted on: Aug 10, 2017 | author: Allan Davison

Is less more when it comes to perimet...

Perimeter security is essential to prevent crime and create alerts before an intruder enters a company’s...

posted on: Aug 7, 2017 | author: Allan Davison

Demystifying security analytics

Security professionals are dealing with an increasing number of advanced and persistent threats. The reality is that...

posted on: Aug 4, 2017 | author: Allan Davison

Protect your communications network a...

Voice over Internet Protocol (VoIP) has become an integral aspect of modern day businesses around the globe, taking...

posted on: Aug 3, 2017 | author: Allan Davison

Keep your ID safe in the cybersphere

Over the course of the past decade, the brick-and-mortar institutions of yesteryear have rapidly been replaced by...

posted on: Jul 26, 2017 | author: Allan Davison

Meet the next generation of cybersecu...

Millennials, the name given to the demographic cohort born between about 1980 and 2000, are members of what is now the...

posted on: Jul 19, 2017 | author: Allan Davison

A zero-trust approach to cybersecurit...

Today’s cybersecurity threats have matured well beyond viruses, and the stakes have grown too. While...

posted on: Jul 19, 2017 | author: Allan Davison

Two-factor authentication an underuti...

Whenever a business considers the security measures it can implement, three options always crop up: antivirus on...

posted on: Jul 18, 2017 | author: Allan Davison

« Previous Entries