subscribe: Daily Newsletter

 

Nokia security software taps automati...

Nokia has announced its next-generation NetGuard Security Management Centre software, designed to bolster service...

posted on: Nov 16, 2017 | author: Allan Davison

Biometric authentication and its use ...

As the line between our digital and physical identities becomes more and more blurred, biometric identification and...

posted on: Nov 16, 2017 | author: Allan Davison

Spammers cash in on Blockchain

While cryptocurrency holders search for new investment opportunities and ways to increase their savings, and...

posted on: Nov 13, 2017 | author: Allan Davison

NEC/XON launches integrated physical ...

XON and NEC’s sixth annual summit in Cape Town just ahead of AfricaCom saw the launch of the joint Cyber Defence...

posted on: Nov 8, 2017 | author: Allan Davison

Sophos XG Firewall improves network v...

Sophos has announced the latest version of its next-generation Sophos XG Firewall that delivers a breakthrough in...

posted on: Nov 2, 2017 | author: Allan Davison

Kaspersky, Marsh offer cybersecurity ...

Kaspersky Lab and Marsh — a global leader in insurance broking and risk management – have signed a...

posted on: Oct 27, 2017 | author: Allan Davison

XON, NEC Africa deliver integrated de...

XON and NEC Africa will launch their joint Cyber Defence Operation Centre (CDOC), the only such facility from a single...

posted on: Oct 27, 2017 | author: Allan Davison

ESET works with Google to halt malwar...

ESET has launched Chrome Cleanup, a new scanner and cleaner for Google Chrome designed to help users browse the web...

posted on: Oct 18, 2017 | author: Allan Davison

Outwit cyber opponents with integrate...

Even though cyber security has been put under the microscope, and in spite of years of experience and cyber security...

posted on: Oct 18, 2017 | author: Allan Davison

Capture the Flag whitehat contest ope...

Kaspersky Lab has announced the international industrial Capture the Flag (CTF) security competition, offering...

posted on: Oct 5, 2017 | author: Allan Davison

Endpoint detection and response pilot...

The persistent nature of advanced threats requires enterprises to re-evaluate their cybersecurity ecosystems, putting...

posted on: Oct 5, 2017 | author: Allan Davison

Intact introduces vulnerability and p...

Security specialist Intact Software Distribution is adding vulnerability and penetration testing to its range of...

posted on: Oct 4, 2017 | author: Allan Davison

Get smarter with security

When it comes to perimeter protection and security, gone are the days when the cheapest solution would be acceptable....

posted on: Nov 20, 2017 | author: Allan Davison

How ethical hacking can prevent fraud

Those of us who work in risk management spend a large portion of our time in a theoretical world, writes Rudi Dicks,...

posted on: Nov 16, 2017 | author: Allan Davison

Cybersecurity is a strategic issue

As organisations embark on their digital transformation journeys, they are seeking to tap new business opportunities,...

posted on: Nov 15, 2017 | author: Allan Davison

Hidden dangers for children on the In...

Although the Internet is an incredible place for children to learn, play games and experience new things, it exposes...

posted on: Nov 13, 2017 | author: Allan Davison

Encryption is like beer goggles

Encryption has become key to protecting the privacy of electronic communication — and for certain transactions,...

posted on: Nov 13, 2017 | author: Allan Davison

Property owners must protect against ...

As property owners increasingly look to invest in technologically smart buildings, they should give equal...

posted on: Nov 10, 2017 | author: Allan Davison

The science of securing cyber skills

Urgent measures need to be taken to bridge the rapidly increasing cybersecurity skills gap, says Martin Walshaw,...

posted on: Nov 10, 2017 | author: Allan Davison

What to do if you’ve been compr...

The personal details of millions of South Africans were recently leaked in the Deeds Data Breach — including ID...

posted on: Nov 8, 2017 | author: Allan Davison

Blockchain could end identity theft

Somebody could be using your personal information right now to commit fraud. The scary thing is, you wouldn’t...

posted on: Nov 6, 2017 | author: Allan Davison

Small businesses still cybercrime tar...

We’ve seen a great deal of threats highlighted this year, as well as information leaks, IoT botnets and some...

posted on: Nov 2, 2017 | author: Allan Davison

Ways to fight ransomware

Today, there’s a good chance you know of either an individual or a company who has fallen victim to ransomware....

posted on: Oct 31, 2017 | author: Allan Davison

Tips for software cybersecurity

Protecting sensitive client information has never been more important, as data breaches and hacks become more...

posted on: Oct 30, 2017 | author: Allan Davison

« Previous Entries