subscribe: Daily Newsletter

 

Machine learning enhances data protec...

Kaspersky Lab has released Kaspersky Fraud Prevention Cloud, a new solution for organisations facing risks from...

posted on: Mar 16, 2017 | author: Allan Davison

Vox launches Gate Guard for added acc...

Vox has launched Gate Guard, a self-contained access control security solution that allows companies to remotely...

posted on: Mar 14, 2017 | author: Allan Davison

CA leads in Identity Governance and A...

CA Technologies has been positioned by Gartner, Inc., in the Leaders quadrant of the 2017 Gartner Magic Quadrant for...

posted on: Mar 14, 2017 | author: Allan Davison

Fortinet Managed Security Service Pro...

Fortinet has launched a new programme to empower MSSPs (Managed Security Service Providers) with the tools, expertise,...

posted on: Mar 7, 2017 | author: Allan Davison

Kaspersky Lab retains secure testing ...

Kaspersky Lab has continued to outperform the competition in its TOP3 metric for Internet security, achieving the top...

posted on: Mar 6, 2017 | author: Allan Davison

Sophos debuts unified security and co...

Sophos has announced Sophos Mobile 7, the latest version of its Enterprise Mobility Management (EMM) solution. The...

posted on: Mar 3, 2017 | author: Allan Davison

Kaspersky Lab looks beyond the horizo...

Kaspersky Lab has announced the launch of Earth 2050 at the panel discussion that took place at Mobile World Congress...

posted on: Mar 3, 2017 | author: Allan Davison

Take the worry out of account securit...

Kaspersky Lab has presented a new version of its freemium solution Kaspersky Password Manager. It offers users remote...

posted on: Mar 2, 2017 | author: Allan Davison

Sophos announces Mobile 7

Sophos has announced the latest version of its Enterprise Mobility Management (EMM) solution, Sophos Mobile 7. This...

posted on: Mar 1, 2017 | author: Allan Davison

Ovum publishes research note on Arbor...

Ovum has published a research note on Arbor SP Insight, a new software-based extension to its Arbor Networks SP...

posted on: Feb 24, 2017 | author: Allan Davison

BT, Symantec enhance network protecti...

BT and Symantec has announced the integration of Symantec’s latest technology into BT’s portfolio of...

posted on: Feb 20, 2017 | author: Allan Davison

Mimecast combats internal email threa...

Mimecast has introduced the latest capability of its Targeted Threat Protection service, Internal Email Protect, the...

posted on: Feb 16, 2017 | author: Allan Davison

How to keep IoT devices safe

The Internet of Things (IoT) is rapidly taking off as people and businesses connect everything from their cars, to...

posted on: Mar 23, 2017 | author: Allan Davison

Securing your growing home network

The number of connected devices in South African homes are expected to increase exponentially. Smart TVs, connected...

posted on: Mar 17, 2017 | author: Allan Davison

Weaponised IoT attacks: what does the...

The explosion of connected devices onto our networks is fuelling our imaginations and inspiring incredible visions for...

posted on: Mar 15, 2017 | author: Allan Davison

When do-it-yourself IT security no lo...

The complexities and continuous evolvement of IT security threats have made managing them a specialist field. With...

posted on: Mar 10, 2017 | author: Allan Davison

Staying secure in the mobile-first, c...

The operating environment for organisations of all sizes has changed as a result of technology trends such as cloud...

posted on: Mar 9, 2017 | author: Allan Davison

10 reasons why cybercriminals target ...

Smartphones have become a central part of our lives, allowing us to perform all sorts of tasks that make our everyday...

posted on: Mar 8, 2017 | author: Allan Davison

Get the most out of your surveillance...

Recently, there has been much discussion about the differences between (and resulting advantages of) thermal cameras...

posted on: Mar 7, 2017 | author: Allan Davison

Proactively defending your network

Cyber attacks occur with increasing speed and sophistication. Advanced persistent threats (APTs) that are tailored to...

posted on: Feb 24, 2017 | author: Allan Davison

Staying secure in the mobile-first, c...

The operating environment for organisations of all sizes has changed as a result of technology trends such as cloud...

posted on: Feb 23, 2017 | author: Allan Davison

Security and IoT: can they be compati...

Robert Miller, head of operational technology at MWR InfoSecurity, unpacks the topic of security in the Internet of...

posted on: Feb 16, 2017 | author: Allan Davison

No shame in IT security breaches

One of the first steps to addressing a public health crisis is taking the shame out of it, writes Matthew Gardiner,...

posted on: Feb 8, 2017 | author: Allan Davison

Ambidextrous security posture enables...

As businesses face mounting pressure to evolve everything in their organisation – from technology, to processes,...

posted on: Feb 7, 2017 | author: Allan Davison

« Previous Entries