Mimecast joins IBM security app exchange community
Mimecast has launched Mimecast for IBM QRadar, which integrates email security data into IBM's security intelligence technology. The new Mimecast for IBM QRadar app is designed to offer joint customers improved visibility into potential vulnerabilities and ongoing...
Can MDR bridge the cybersecurity gap?
Technology is evolving, and more organisations and businesses are adopting the newest tech out there. Just as tech is evolving, so too are cyber threats. The challenge for today's businesses is to keep these threats at bay, however, many companies and organisations...
This silly season, deal with spam and phishing
It's the silly season, and while most go shopping, cyber criminals go phishing. With the larger volumes of promotional emails hitting inboxes over the festive and back-to-school period, now is the time for companies to step up email management. "Companies can help...
Adding threat intelligence to the security mix
Today's threat landscape is so complex and fast-paced, it is impossible to prevent every threat or attack. The criminal organisations behind cybercrime are well-funded, and have the technical skills to stay ahead of mitigation tools and techniques. They target...
Beware cyber scammers on Black Friday
With 'Black Friday' just around the corner, this year on 23 November, South Africans are preparing once again to embrace and make this popular American shopping day their own, where retailers offer massive discounts for both online as well as bricks-and-mortar...
Kaspersky Lab gets highest score for malware removal
Kaspersky Lab Internet Security was recently awarded the top prize for proving to be the most effective solution at deleting threats on an already infected machine. After another successful year for Kaspersky Lab products, the AV-Comparatives malware protection test...
Cofense, RSA NetWitness unify phishing defences
The dark art of phishing operates on a very simple premise: send an innocent-looking email to a planned victim to have the victim click on the link; thereby send the victim unwittingly to a site where they should not go; and have the site steal information from the...
What makes a WAF ‘advanced’?
While traditional web application firewalls (WAF) may have once been highly effective in mitigating application layer attacks, this type of solution now has trouble keeping up with the advanced capabilities and agility of attackers. This is according to an F5 white...
Mobile malware prevalent as holidays approach
Fortinet has announced the findings of its latest quarterly Global Threat Landscape Report, which reveals threats are increasing and evolving to become more sophisticated. Unique threat variants and families are on the rise, while botnet infections continue to infect...
A decade of bitcoin heralds a certain future
As bitcoin celebrates a full 10 years since the publication of Satoshi Nakamoto's white paper, the time is right to consider its lasting impact on the colliding worlds of information technology and finance. By Joe Pindar, research and development director: data...
Surveillance evolves as cameras get a brain
Advanced new facial recognition technology is giving ordinary surveillance systems the ability to learn, analyse what cameras see, conduct market research and even proactively mitigate risk. Video surveillance systems are an important step towards enhanced security,...
Syrex delivers perimeter security of the future
The partnership between Syrex and Check Point Software Technologies has gone from strength-to-strength over the past three years with the South African ICT solutions provider using it to provide local clients with a unique approach to next-generation firewalls. "At...