subscribe: Daily Newsletter

 

Sophos placed in UTM Leaders Quadrant

Sophos has once again been positioned in the “Leaders” quadrant of Gartner’s “Magic Quadrant...

posted on: Jul 19, 2017 | author: Allan Davison

Employees cover up cybersecurity inci...

Employees hide IT security incidents in 40% of businesses around the world (this figure is 48% for South African...

posted on: Jul 19, 2017 | author: Allan Davison

Arbor Networks further automates DDoS...

Arbor Networks has announced a new version of its on-premise, always-on, inline distributed denial-of-service (DDoS)...

posted on: Jul 19, 2017 | author: Allan Davison

IS launches cybersecurity education s...

Internet Solutions has launched PhishNet to support corporate cybersecurity education efforts. PhishNet allows...

posted on: Jul 17, 2017 | author: Allan Davison

Gemato offers biometrics, machine lea...

Gemalto is launching the Gemalto Assurance Hub, a new approach to fraud prevention in online banking. Powered by...

posted on: Jul 10, 2017 | author: Allan Davison

Great expectations for new era of ent...

The recent surge in network security preparedness has been driven by threats related to remote access employees...

posted on: Jul 5, 2017 | author: Allan Davison

Getting to grips with the Petya virus

Picture the scene: in parts of Africa and Europe, office workers are sitting at their computers when the instruction...

posted on: Jul 3, 2017 | author: Allan Davison

Growing concern over global security

The recent WannaCry and Petya ransomware attacks over the space of a month have emphasised the importance of...

posted on: Jul 3, 2017 | author: Allan Davison

Sophos XG firewall performs well in N...

NSS Labs has rated the Sophos XG Firewall as one of the highest performing firewalls in the industry in its most...

posted on: Jul 3, 2017 | author: Allan Davison

VMware NSX meets government security ...

VMware NSX has achieved the Common Criteria Evaluation Assurance Level (EAL) 2+ certification under the Common...

posted on: Jun 26, 2017 | author: Allan Davison

Hyper-efficient DDoS variant uses few...

Distributed Denial of Service (DDoS) attacks continue to morph and bend into new, dangerous shapes. While reflection...

posted on: Jun 21, 2017 | author: Allan Davison

Kaspersky Embedded Systems Security c...

With the tactics of cybercriminals becoming ever more sophisticated, and with regulatory pressures also mounting,...

posted on: Jun 14, 2017 | author: Allan Davison

Meet the next generation of cybersecu...

Millennials, the name given to the demographic cohort born between about 1980 and 2000, are members of what is now the...

posted on: Jul 19, 2017 | author: Allan Davison

A zero-trust approach to cybersecurit...

Today’s cybersecurity threats have matured well beyond viruses, and the stakes have grown too. While...

posted on: Jul 19, 2017 | author: Allan Davison

Two-factor authentication an underuti...

Whenever a business considers the security measures it can implement, three options always crop up: antivirus on...

posted on: Jul 18, 2017 | author: Allan Davison

More about the DBE’s hacking in...

The Department of Basic Education’s website was recently hacked by the Islamic State, posting gory pictures and...

posted on: Jul 14, 2017 | author: Allan Davison

Boosting cyber security skills

The shortage of security skills is a growing concern for SA businesses. Coupled with the increased sophistication and...

posted on: Jul 7, 2017 | author: Allan Davison

Protect your system from ransomware

Another round of ransomware assault has just hit over 2,000 global targets, including Danish shipping company Maersk,...

posted on: Jul 6, 2017 | author: Allan Davison

Top tips for preventing invoice fraud

Invoice fraud is becoming more common in South Africa, perhaps in response to worsening economic conditions....

posted on: Jul 6, 2017 | author: Allan Davison

Preventing Petya – stopping the...

Check Point’s Incident Response Team has been responding to multiple global infections caused by a new variant...

posted on: Jul 3, 2017 | author: Allan Davison

Nigerian-phishing scammers are after ...

Attackers behind a recent surge in phishing and payment-interception attacks on industrial companies are also stealing...

posted on: Jun 21, 2017 | author: Allan Davison

The Fireball makes you WannaCry

J2 Software cautions that the recent cyber-attacks serve to emphasise one brutal fact: every organisation is...

posted on: Jun 14, 2017 | author: Allan Davison

Ransomware: The only protection is us...

Ransomware is a very real threat to businesses and individuals alike, and when it comes to online security, it is...

posted on: Jun 8, 2017 | author: Allan Davison

Must-have Android privacy and securit...

NordVPN presents 10 must-have apps for your Android device to keep your data safe and private This year has seen some...

posted on: May 31, 2017 | author: Allan Davison

« Previous Entries