Security, security, security

Jason Dover, director: product line management at KEMP Technologies explores the security imperative for today’s complex networks. It is every CISO’s worst nightmare – the phone call in the middle of the night to say that a security breach has...

DDoS protection needs a multi-faceted approach

With distributed denial of service (DDoS) attacks becoming more complex and sophisticated, so must any defensive strategy that attempts to fully protect a financial institution. This is according to Arbor Networks, the security division of Netscout. While traditional...

Fighting the scourge of blog spam

Back in the late 90s, a new type of journalism emerged, alongside the advent of free publishing platforms. At the time, no one knew blogging would become one of the most important platforms of expression, and the sharing of news and ideas, forever altering the face of...

Battling the enemy within

The world moves swiftly; the IT security world even more so. Just a couple of years ago, securing the enterprise would basically consist of protecting an organization from external intruders. Today, the battle has changed ground. By Michael Xie, founder, president and...

How to protect your device from mobile malware

Mobile malware is on the increase and the purpose of almost all of it is to generate income for cybercriminals. Some malware can monitor devices for banking transactions, gathering sensitive details like passwords and account numbers. Quite common is malware that...

How to build a successful application-security programme

Although #Great (corporate) Wall of China never trended on underworld Twitter sites, so far as we know, there’s no real doubt that firewalls have well and truly failed as effective ways to secure corporate systems and data. The number of breaches reported daily...