Jul 22, 2016
Some experts call biometrics the answer to identity theft. Biometric verification is a process of identity authentication that is used to confirm identity through uniquely detectable biological traits and may be an effective tool in the war on crime. With the drastic...
Jul 22, 2016
An increasing number of government regulations, industry standards and internal risk mitigation policies require organisations to sanitise storage media prior to disposal or reuse. Xperien has now introduced a hard drive degausser and physical destroyer, specifically...
Jul 19, 2016
Cyber forensics expert, Preeya Ramjee, has cautioned cellphone users to be vigilant about securing the data on their mobile phones following a sharp rise in cyber theft over the past few years. While cellphones have transformed the way we work and live, they also...
Jul 19, 2016
A new firewall offering from the Sophos Group is now available from Duxbury Networking. Dubbed the XG Firewall, it is designed to provide unprecedented visibility into the corporate network. With the ability to provide detailed, actionable intelligence on user...
Jul 4, 2016
Check Point Software Technologies has published its latest Threat Index for May 2016, revealing that the number of active global malware families increased by 15% in May 2016. The May Threat Index presents a mixed view of Africa, with several countries making quite...
Jul 4, 2016
Security solution distributor, Netxactics, has announced availability of the Thycotic range of Privileged Account Management (PAM) software solutions. This is the first time the product set is available locally, and offers protection against cyber-attacks that use...