subscribe: Daily Newsletter

 

BT, Symantec enhance network protecti...

BT and Symantec has announced the integration of Symantec’s latest technology into BT’s portfolio of...

posted on: Feb 20, 2017 | author: Allan Davison

Mimecast combats internal email threa...

Mimecast has introduced the latest capability of its Targeted Threat Protection service, Internal Email Protect, the...

posted on: Feb 16, 2017 | author: Allan Davison

Trend Micro TippingPoint adds machine...

Trend Micro has announced the latest enhancements to its network defense solutions, leveraging the company’s...

posted on: Feb 15, 2017 | author: Allan Davison

Kaspersky Lab debuts Kaspersky Operat...

KasperskyOS is a specialised operating system designed for embedded systems with strict cybersecurity requirements....

posted on: Feb 15, 2017 | author: Allan Davison

Sophos positioned in Leaders’ Q...

Gartner has once again positioned Sophos as a Leader in the Gartner Magic Quadrant for Endpoint Protection Platforms...

posted on: Feb 14, 2017 | author: Allan Davison

Kaspersky leads in Endpoint Protectio...

Kaspersky Lab has been positioned in the “Leaders” quadrant of the 2017 Gartner Magic Quadrant for...

posted on: Feb 14, 2017 | author: Allan Davison

F5 announces application security sol...

F5 has announced a portfolio of security solutions to provide new levels of visibility and control in an ever-evolving...

posted on: Feb 13, 2017 | author: Allan Davison

ESET boosts defences as ransomware mo...

ESET is strengthening its defenses against ransomware and has added Ransomware Shield, another layer protection, to...

posted on: Feb 13, 2017 | author: Allan Davison

Fortinet extends security fabric to I...

Fortinet announced the extension of the Fortinet Security Fabric to defend enterprises against the exponentially...

posted on: Feb 8, 2017 | author: Allan Davison

Kaspersky protects FIDE and the World...

Modern-day chess is a sport that combines human excellence with mathematical accuracy and computer analysis like no...

posted on: Feb 7, 2017 | author: Allan Davison

Redstor rallies to fight ransomware

Ransomware attacks are becoming more prevalent and end users within small-to-medium business segment and education are...

posted on: Feb 6, 2017 | author: Allan Davison

Sophos debuts phishing attack simulat...

Sophos has launched Sophos Phish Threat, an advanced phishing attack simulator and training solution that is fully...

posted on: Feb 3, 2017 | author: Allan Davison

How to keep IoT devices safe

The Internet of Things (IoT) is rapidly taking off as people and businesses connect everything from their cars, to...

posted on: Mar 23, 2017 | author: Allan Davison

Securing your growing home network

The number of connected devices in South African homes are expected to increase exponentially. Smart TVs, connected...

posted on: Mar 17, 2017 | author: Allan Davison

Weaponised IoT attacks: what does the...

The explosion of connected devices onto our networks is fuelling our imaginations and inspiring incredible visions for...

posted on: Mar 15, 2017 | author: Allan Davison

When do-it-yourself IT security no lo...

The complexities and continuous evolvement of IT security threats have made managing them a specialist field. With...

posted on: Mar 10, 2017 | author: Allan Davison

Staying secure in the mobile-first, c...

The operating environment for organisations of all sizes has changed as a result of technology trends such as cloud...

posted on: Mar 9, 2017 | author: Allan Davison

10 reasons why cybercriminals target ...

Smartphones have become a central part of our lives, allowing us to perform all sorts of tasks that make our everyday...

posted on: Mar 8, 2017 | author: Allan Davison

Get the most out of your surveillance...

Recently, there has been much discussion about the differences between (and resulting advantages of) thermal cameras...

posted on: Mar 7, 2017 | author: Allan Davison

Proactively defending your network

Cyber attacks occur with increasing speed and sophistication. Advanced persistent threats (APTs) that are tailored to...

posted on: Feb 24, 2017 | author: Allan Davison

Staying secure in the mobile-first, c...

The operating environment for organisations of all sizes has changed as a result of technology trends such as cloud...

posted on: Feb 23, 2017 | author: Allan Davison

Security and IoT: can they be compati...

Robert Miller, head of operational technology at MWR InfoSecurity, unpacks the topic of security in the Internet of...

posted on: Feb 16, 2017 | author: Allan Davison

No shame in IT security breaches

One of the first steps to addressing a public health crisis is taking the shame out of it, writes Matthew Gardiner,...

posted on: Feb 8, 2017 | author: Allan Davison

Ambidextrous security posture enables...

As businesses face mounting pressure to evolve everything in their organisation – from technology, to processes,...

posted on: Feb 7, 2017 | author: Allan Davison

« Previous Entries Next Entries »