Kaspersky Lab moves to secure cryptocurrency exchanges
The role of cryptocurrencies in online financial transactions is growing rapidly - not only for investors, but also for cyber-criminals, who have netted nearly $10-million using fraudulent schemes in the last year. To safeguard the evolution from a constantly...
Why the CIOs/CISO positions is becoming more challenging
CIOs and CISO's across industries are regularly moving between positions and companies because of this common mistake, writes Pieter Engelbrecht, Aruba BU manager for sub-Saharan Africa. It's your worst possible nightmare. A hacker has breached the company's network...
Blue Label offers new ExtraHop Reveal(x)
Blue Label Technology Solutions has announced the availability of ExtraHop Reveal(x) Summer 2018 in South Africa, a new release which highlights late stage cyber-attack activities and significantly reduces 'dwell' time. Between 2017 and 2018, threat dwell time in the...
Email security essential in the digital age
A relationship that began many years ago with the migration of the Syrex secure email gateway services to Mimecast has evolved into a partnership for the future as companies need to become increasingly cyber resilient to protect themselves against malicious email...
Kaspersky Lab helps build skilled capacity with SABRIC
Kaspersky Lab concluded a memorandum of understanding (MOU) signed with the South African Banking Risk Information Centre (SABRIC) in October 2017 and plans to renew the MOU for a further year, following its success. The MOU has seen Kaspersky Lab successfully support...
Check Point Software to acquire Dome9
Check Point Software Technologies has acquired Dome9 of Tel Aviv, Israel. This acquisition enhances Check Point's fully consolidated Infinity architecture and its Cloud Security offering with advanced active policy enforcement and multi-cloud protection capabilities....
Scams and flaws: why we get duped
Con artists have been plying their trade since time immemorial, but the internet opened the floodgates to a whole new level of swindling. It has allowed fraudsters to take aim at an endless number of victims and at the range of victims that they never could have...
Dell EMC delivers last line of data protection
Dell EMC Cyber Recovery software, along with Dell EMC Cyber Recovery Services, is designed to help provide a last line of data protection defence against ransomware and destructive cyber attacks. The new software includes innovative automation, workflow and security...
ESET launches new security solutions
The latest version of ESET NOD32 Antivirus, ESET Internet Security and ESET Smart Security Premium offer fortified multilayered protection, enhanced IoT protection, product referral and a new security report feature. It is predicted that, by 2025, there will be over...
Kaspersky team recognized for ShadowPad discovery
The Kaspersky Lab Global Research and Analysis Team (GReAT) was recognised with the Annual Péter Szőr Award for Technical Security Research for its work on uncovering and analysing the ShadowPad operation, one of the most significant supply-chain attacks known to...
Before you give into ransom demands …
Despite small and medium enterprises (SMEs) becoming increasingly popular targets for cybercriminals, many remain completely unprotected in this regard. As a result, when faced with a ransomware attack, there is often a lack of preparation and awareness around the...
Recognise and prevent modern cyber scams
When it comes to protecting yourself and your organization against cyber scams, there's no "one-size-fits-all" solution. By Doros Hadjizenonos, regional sales director at Fortinet in South Africa As organisations and people alike continue to adopt new devices and...