Aug 19, 2013
Endpoints are often the initial ‘surface’ where attacks and exploits occur. In fact, both the RSA breach and the notorious Google Aurora attack originated at a single compromised endpoint. It has long been known that technical departments need to invest in endpoint...
Aug 7, 2013
As the name suggests, the value of a Wildcard SSL certificate varies and is determined by its audience. There are several risks associated with this certificate type, says Megan Rehbock, LAWtrust certificate service manager. Wildcard certificates, which support all...
Aug 2, 2013
IT security has no respect for size. A hacking group can have hundreds or thousands of members globally, like anonymous, or just a handful, like the group that mounted the successful Eurograbber attacks against banks in 2012 – but in either case, the disruption to the...
Aug 1, 2013
South African companies are generally well aware of the dangers of external hacking attacks but often overlook the threat of internal data leaks – whether malicious or accidental. Companies in mining and construction tend be more vulnerable than they realise, and...
Jul 26, 2013
Cloud computing has moved well beyond buzzword status to become a bona fide business-enabling technology area that can be used enterprise-wide, by sales, marketing, procurement and line of business, and for multiple purposes – including collaboration, says Tony...
Jul 24, 2013
Misuse of office computers does not just reduce productivity and waste time and money. More importantly, it puts corporate network security at risk, jeopardising critical data. Communicating on social networking sites or via IM, visiting entertainment sites, or...