May 31, 2013
Threat emulation is a critical technique in achieving more effective network security. “Know your enemy as well as you know yourself” is a frequently-quoted statement in IT security, says Doros Hadjizenonos, sales manager at Check Point South Africa. ...
May 22, 2013
Bringing the issue of security into the big data discussion often produces two divergent schools of thought from IT professionals − categorical denial that big data should be treated any differently from existing network infrastructure, and an opposite response...
May 21, 2013
Security software is something every person with a computer and an Internet connection should have to protect personal information from a wide variety of cybercrime threats, says Fred Mitchell, Symantec business unit manager, Drive Control Corporation. However, having...
May 17, 2013
Virtualised desktops, servers, data centres and cloud computing solutions should be afforded the same level of security as physical machines, is the word from global security specialists Trend Micro. According to Trend Micro country manager, Gregory Anderson, there...
May 10, 2013
According to a Forrester survey carried out in Q4 of 2012 75% of company employees across the globe want to use their personal mobile devices for work on a daily basis. This is a 3% increase from the figures in 2011. Most (76%) of this group is specifically interested...
May 3, 2013
With the increasing importance of the online world and its impact on users’ daily lives, today people spend more and more time online, using Web-based services such as social networks like Twitter, Linkedin and Skype, and e-mail and online banking. However,...