Kaspersky Security Cloud strengthens privacy control
Kaspersky has updated Kaspersky Security Cloud - its account-based service with access to the company's best consumer technologies and tools - with new ways to protect user privacy across multiple devices. Kaspersky Security Cloud now reduces the risk of users'...
Seacom, Sophos secure SMEs
Seacom has joined forces with Sophos to provide a next generation security solution called On-Premise Security to cost-conscious small and medium enterprises (SMEs) across South Africa. Seacom's On-Premise Security is a full-suite solution that uses Sophos' XG...
Access control is paramount for data security in the cloud
Companies are increasingly shifting IT services and applications to the cloud to be readily available to employees, empowering their productivity from wherever they are and from any device. Moving critical business information to the cloud does come with security...
Steps to successful biometric implementation
Biometrics can provide the organisation an intelligent balance of security and convenience if implemented and managed correctly. By Marius Coetzee, CEO of Ideco Biometrics has often been considered a risky and unreliable investment for many organisations. Its rocky...
Cyber security requires a new approach
From digital transformation through to the arrival of the Fourth Industrial Revolution (4IR), decision-makers are changing their views on how technology can benefit the organisation. But while much attention is placed on things like data analysis, the cloud, and...
Are SA firms flipping a coin on their cybersecurity?
Would you gamble flipping a coin for the effectiveness of your cybersecurity plan? Heads: you're able to prevent - or recover from - a cyberattack. Tails: you fall victim to a cybercriminal, lose critical business data, suffer immense business productivity and...
The dark side of apps
With the world's population of mobile phone users set to reach 4,68-million this year - 2,7-billion of those being smartphone users, mobile device security threats are on the rise. "Apps pose a real problem for mobile users, who give them sweeping permissions, but...
Protection against APT’s everyone’s business
Companies should be as invested in protecting networks and data against advanced persistent threats (APTs) as cyber criminals are in targeting and implementing their attacks. In the past, APT counter measures were only implemented by certain sectors where there were...
Securing and managing devices the modern way
Organisations of all types and sizes are bringing vast numbers of devices into their IT infrastructure and networks. Moreover, these days, these devices are not only smartphones, wearables and tablets, because the Internet of Things (IoT) is seeing a slew of new...
Trend Micro delivers XDR across all workloads
Trend Micro has become the first to offer detection and response capabilities integrated across email, network, endpoint, server and cloud workloads. This is designed to give enterprises broader visibility of a risk posture while connecting minor events from different...
Cloud Atlas APT upgrades with polymorphic malware
Cloud Atlas, an advanced persistent threat (APT), also known as Inception, has updated its attack arsenal with new tools which allow it to avoid detection through standard Indicators of Compromise. This updated infection chain has been spotted in the wild in different...
The rise of nation-state attacks
A new phase of cyber warfare has begun, writes Simon McCullough, major channel account manager at F5 Networks. Hackers acting on behalf of nation-state powers are no longer just out to disrupt critical infrastructures - they're also actively seeking trade secrets. New...