subscribe: Daily Newsletter

 

Bridge the ‘gap of grief’...

A business-driven security architecture has been unveiled by RSA, a Dell Technologies business, offering a new...

posted on: Jul 26, 2017 | author: Allan Davison

ACaaS catching on as Iot prevails

South Africa is starting to realise the importance of Access Control as a Service (ACaaS). Speaking at the recent...

posted on: Jul 26, 2017 | author: Allan Davison

Bitdefender debuts cross-platform upd...

Bitdefender, the innovative security solutions provider, has released its 2018 consumer line which includes Antivirus...

posted on: Jul 24, 2017 | author: Allan Davison

Sophos placed in UTM Leaders Quadrant

Sophos has once again been positioned in the “Leaders” quadrant of Gartner’s “Magic Quadrant...

posted on: Jul 19, 2017 | author: Allan Davison

Employees cover up cybersecurity inci...

Employees hide IT security incidents in 40% of businesses around the world (this figure is 48% for South African...

posted on: Jul 19, 2017 | author: Allan Davison

Arbor Networks further automates DDoS...

Arbor Networks has announced a new version of its on-premise, always-on, inline distributed denial-of-service (DDoS)...

posted on: Jul 19, 2017 | author: Allan Davison

IS launches cybersecurity education s...

Internet Solutions has launched PhishNet to support corporate cybersecurity education efforts. PhishNet allows...

posted on: Jul 17, 2017 | author: Allan Davison

Gemato offers biometrics, machine lea...

Gemalto is launching the Gemalto Assurance Hub, a new approach to fraud prevention in online banking. Powered by...

posted on: Jul 10, 2017 | author: Allan Davison

Great expectations for new era of ent...

The recent surge in network security preparedness has been driven by threats related to remote access employees...

posted on: Jul 5, 2017 | author: Allan Davison

Getting to grips with the Petya virus

Picture the scene: in parts of Africa and Europe, office workers are sitting at their computers when the instruction...

posted on: Jul 3, 2017 | author: Allan Davison

Growing concern over global security

The recent WannaCry and Petya ransomware attacks over the space of a month have emphasised the importance of...

posted on: Jul 3, 2017 | author: Allan Davison

Sophos XG firewall performs well in N...

NSS Labs has rated the Sophos XG Firewall as one of the highest performing firewalls in the industry in its most...

posted on: Jul 3, 2017 | author: Allan Davison

Who is behind industrial cyberattacks...

Over the past four months, more than 4 000 organisations globally have been targeted by cyberattacks which aim to...

posted on: Aug 23, 2017 | author: Allan Davison

How effective is two-factor authentic...

Should a password get hacked, it could expose the user to viruses, malware and data breaches on their mobile phones...

posted on: Aug 23, 2017 | author: Allan Davison

DDoS and the ostrich syndrome

The so-called ostrich syndrome is a term used to describe people who prefer to “stick their heads in the...

posted on: Aug 21, 2017 | author: Allan Davison

The future of ransomware

Many businesses and individuals have been affected by the various cyber-attacks perpetrated in the past six...

posted on: Aug 16, 2017 | author: Allan Davison

SA operational technologies open to a...

South African operational Industrial Control System (ICS) /SCADA systems are becoming increasingly intelligent and...

posted on: Aug 15, 2017 | author: Allan Davison

The rise of security as a service

The constant evolution of the global security threat landscape is playing a part in the rise of cyber ‘security as a...

posted on: Aug 15, 2017 | author: Allan Davison

Can industrial security drive ops, pr...

With so many moving parts, industrial and manufacturing concerns have a broader risk profile, writes Neil Cameron,...

posted on: Aug 11, 2017 | author: Allan Davison

Cybersecurity in an the era of interc...

Within the modern business environment, employees can communicate and collaborate with customers and colleagues from...

posted on: Aug 10, 2017 | author: Allan Davison

Is less more when it comes to perimet...

Perimeter security is essential to prevent crime and create alerts before an intruder enters a company’s...

posted on: Aug 7, 2017 | author: Allan Davison

Demystifying security analytics

Security professionals are dealing with an increasing number of advanced and persistent threats. The reality is that...

posted on: Aug 4, 2017 | author: Allan Davison

Protect your communications network a...

Voice over Internet Protocol (VoIP) has become an integral aspect of modern day businesses around the globe, taking...

posted on: Aug 3, 2017 | author: Allan Davison

Keep your ID safe in the cybersphere

Over the course of the past decade, the brick-and-mortar institutions of yesteryear have rapidly been replaced by...

posted on: Jul 26, 2017 | author: Allan Davison

« Previous Entries Next Entries »