New solution to beat identity theft

Some experts call biometrics the answer to identity theft. Biometric verification is a process of identity authentication that is used to confirm identity through uniquely detectable biological traits and may be an effective tool in the war on crime. With the drastic...

Total data erasure and hard drive destruction

An increasing number of government regulations, industry standards and internal risk mitigation policies require organisations to sanitise storage media prior to disposal or reuse. Xperien has now introduced a hard drive degausser and physical destroyer, specifically...

Secure your cellphone data

Cyber forensics expert, Preeya Ramjee, has cautioned cellphone users to be vigilant about securing the data on their mobile phones following a sharp rise in cyber theft over the past few years. While cellphones have transformed the way we work and live, they also...

New firewall helps identify risk-prone network users

A new firewall offering from the Sophos Group is now available from Duxbury Networking. Dubbed the XG Firewall, it is designed to provide unprecedented visibility into the corporate network. With the ability to provide detailed, actionable intelligence on user...

Big increase in active malware families

Check Point Software Technologies has published its latest Threat Index for May 2016, revealing that the number of active global malware families increased by 15% in May 2016. The May Threat Index presents a mixed view of Africa, with several countries making quite...

Netxactics now offers Thycotic PAM solutions

Security solution distributor, Netxactics, has announced availability of the Thycotic range of Privileged Account Management (PAM) software solutions. This is the first time the product set is available locally, and offers protection against cyber-attacks that use...