The state of cybersecurity in sub-Saharan Africa
Trend Micro held its first Security Trends event last week in Cape Town and Johannesburg, highlighting the importance of cyber security within South Africa, and globally. Digital transformation is gaining speed, with up to 44% of decision makers in organisations in...
The state of cybersecurity in sub-Saharan Africa
Trend Micro held its first Security Trends event last week in Cape Town and Johannesburg, highlighting the importance of cyber security within South Africa, and globally. Digital transformation is gaining speed, with up to 44% of decision makers in organisations in...
Kaspersky Lab recognised for online banking security excellence
Kaspersky Internet Security has received the annual MRG Effitas Online Banking/Browser Security Award 2017/18 after consistently passing quarterly banking certification tests across a 12-month period. The award emphasises the solution's reliability and efficiency...
ESET launches new endpoint security
ESET has launched a new line of endpoint security solutions designed to provide tools for prevention and management of cyber risks on a global scale. ESET Dynamic Threat Defense is an off-premise cloud sandboxing solution providing almost instant analysis of zero-day...
Securing the mobile enterprise
The rise of the Internet of things (IoT) is seeing our world and our lives become increasingly connected. Our devices talk to each other and to the Web. We can disarm our alarms and turn off our home lights remotely. We can send money around the world. We can chat to...
Network security 101 – cyber security basics
Michael Colin, head of sales at BitCo Telecoms, has compiled this basic cybersecurity guide for businesses. What you and your employees need to know about IT security: To best protect your business against malicious attacks and security breaches, you have to...
Axis intelligent thermal cameras from Duxbury
The Axis range of intelligent thermal cameras, with various analytics applications, is available from Duxbury Networking. The cameras are suited to a wide range of security applications, including physical and virtual perimeter protection around critical...
Fortinet expands security fabric offerings
Fortinet has announced the expansion of Fortinet Security Fabric offerings on Google Cloud Platform, enabling customers to better protect the expanded attack surface of hybrid cloud environments. Adding to its existing FortiGate Next-Generation Firewall offering,...
Gemalto boosts cloud security
Gemalto has announced a next-generation key management solution, SafeNet Virtual KeySecure, for simpler and stronger cloud security. Companies can extend their data protection policies to private and public clouds and centralize encryption and key management...
Machine learning takes on spam
Spam: the bane of the user's existence and the cyber criminal's friend. We've all, at some stage, received these unwanted emails advertising products and services we most certainly have no interest in. Early attempts at blocking spam in the early 2000s produced a...
A guide to effective, robust corporate security
There is a heightened sense of cyber security in the corporate world. Companies are now more aware than ever before of the level of risk they are exposed to and the real danger that sophisticated cyber threats pose. Cyber-criminals are using sophisticated tech-driven...
Solutions for when the kids are home alone
What images do you conjure when thinking about your kids being home alone? By Jaime Siminoff, founder and chief inventor at Ring In the 1990 movie, 8-year-old Kevin is accidentally left alone as his family heads to a vacation destination. His mother has a completely...