Feb 8, 2016
Obtaining sensitive data is the primary objective for cybercriminals when targeting businesses. Sensitive data can vary depending on the organisation but examples include intellectual property, source code, trade secrets, customer and employee personal identifiable...
Feb 5, 2016
The convergence of the digital and physical worlds is more than a MasterCard rally cry, writes Ajay Bhalla, president: enterprise security solutions at MasterCard. It is in fact a fundamental shift that’s driving the Fourth Industrial Revolution or Industry 4.0,...
Feb 5, 2016
Cloud-based security solutions are the more effective and most immediate way for companies to deal with security threats arising from the multiple internet access points created by employees on their devices from remote places. This is according to Richard Broeke, an...
Feb 4, 2016
Jason Dover, director: product line management at KEMP Technologies explores the security imperative for today’s complex networks. It is every CISO’s worst nightmare – the phone call in the middle of the night to say that a security breach has...
Feb 2, 2016
With distributed denial of service (DDoS) attacks becoming more complex and sophisticated, so must any defensive strategy that attempts to fully protect a financial institution. This is according to Arbor Networks, the security division of Netscout. While traditional...
Feb 2, 2016
Back in the late 90s, a new type of journalism emerged, alongside the advent of free publishing platforms. At the time, no one knew blogging would become one of the most important platforms of expression, and the sharing of news and ideas, forever altering the face of...