Apr 21, 2015
Continuous end-point visibility has a massive role to play in mature security programs, says John Mc Loughlin, MD of J2 Software. Our customers with mature security programs have invested heavily in perimeter security, logging, and enhanced server / endpoint controls,...
Apr 21, 2015
As the business realm continues to digitise, fraud, ID theft and information security concerns grow, and strong authentication becomes a critical issue. Voice biometrics is being adopted globally by companies, especially those with large contact centre operations,...
Apr 19, 2015
As governments around the world mull over cyber security measures and possible new legislation, many small and medium enterprises are pondering whether internet security is a real concern for their businesses, either because they are too small, or they don’t have...
Apr 16, 2015
Security, while a topic on every organisation’s lips, is also one that attracts a large number of myths. This is due in part to lack of information, erroneous assumptions and generalisations. As with all myths, they are filtered down from one person to another, mostly...
Apr 16, 2015
High profile cyber-attacks on blue-chip global companies have sent shockwaves around the technology industry. It’s clear that threats in the digital era are morphing – becoming ever-more sophisticated and destructive. In the past couple of years, we have seen...
Apr 14, 2015
Always-on connectivity has become part and parcel of today’s society, with more and more people relying heavily on email, social media and Web browsing, says Simeon Tassev, director and QSA at Galix. Children growing up in this era have unprecedented access to...