Jan 20, 2017
Encryption is an effective weapon against cybercrime, writes Martin Walshaw, senior engineer at F5 Networks. Securing valuable data flow between applications is essential for safeguarding identity and helping communications between a web browser and a server to remain...
Jan 19, 2017
The cost of any type of theft is often a lot higher than just the value of the stolen goods, writes Doros Hadjizenonos, country manager of Check Point South Africa. If your house was broken into, you would feel violated. While your insurance company would reimburse...
Jan 18, 2017
Trend Micro has announced the availability of the latest Trend Micro TippingPoint NX Series next-generation intrusion prevention systems (NGIPS). The series includes a first-to-market standalone NGIPS solution that delivers up to 100 Gb inspection throughput with low...
Jan 17, 2017
A well-known characteristic of criminals in any space is that they are unpredictable. They look for holes and vulnerabilities in systems and try to use them to their advantage. Security systems, therefore, have to be architected in a way that assumes attack...
Jan 10, 2017
David Emm, principal security researcher at Kaspersky Lab, examines some of the issues around smart homes At the end of 2016, the world discovered just how vulnerable indiscriminately connected Internet-of-Things gadgets could be, when hundreds of thousands of smart...
Jan 10, 2017
Bryan Hamman, territory manager for sub-Saharan Africa at Arbor Networks, talks about the issues around DDoS attacks on IoT devices Embedded Internet-of-Thing (IoT) botnets are not a new phenomenon – we’ve seen them leveraged to launch distributed denial...