Securing the mobile enterprise
The rise of the Internet of things (IoT) is seeing our world and our lives become increasingly connected. Our devices talk to each other and to the Web. We can disarm our alarms and turn off our home lights remotely. We can send money around the world. We can chat to...
Network security 101 – cyber security basics
Michael Colin, head of sales at BitCo Telecoms, has compiled this basic cybersecurity guide for businesses. What you and your employees need to know about IT security: To best protect your business against malicious attacks and security breaches, you have to...
Axis intelligent thermal cameras from Duxbury
The Axis range of intelligent thermal cameras, with various analytics applications, is available from Duxbury Networking. The cameras are suited to a wide range of security applications, including physical and virtual perimeter protection around critical...
Fortinet expands security fabric offerings
Fortinet has announced the expansion of Fortinet Security Fabric offerings on Google Cloud Platform, enabling customers to better protect the expanded attack surface of hybrid cloud environments. Adding to its existing FortiGate Next-Generation Firewall offering,...
Gemalto boosts cloud security
Gemalto has announced a next-generation key management solution, SafeNet Virtual KeySecure, for simpler and stronger cloud security. Companies can extend their data protection policies to private and public clouds and centralize encryption and key management...
Machine learning takes on spam
Spam: the bane of the user's existence and the cyber criminal's friend. We've all, at some stage, received these unwanted emails advertising products and services we most certainly have no interest in. Early attempts at blocking spam in the early 2000s produced a...
A guide to effective, robust corporate security
There is a heightened sense of cyber security in the corporate world. Companies are now more aware than ever before of the level of risk they are exposed to and the real danger that sophisticated cyber threats pose. Cyber-criminals are using sophisticated tech-driven...
Solutions for when the kids are home alone
What images do you conjure when thinking about your kids being home alone? By Jaime Siminoff, founder and chief inventor at Ring In the 1990 movie, 8-year-old Kevin is accidentally left alone as his family heads to a vacation destination. His mother has a completely...
Free online webinar on cybersecurity
Large scale ransomware attacks and data breaches have dominated the news recently. "It is clear from these cybersecurity incidents that traditional methods of protection are no longer enough to prevent attacks" says Jeremy Matthews, regional manager of Panda Security...
Gemalto, Entrust Datacard extend partnership
Gemalto and trusted identity and secure transaction technology solutions provider Entrust Datacard have expanded their longstanding partnership to include a secure framework for Internet-connected devices. The new collaboration and integration will allow customers to...
ThisIsMe expands security solution
Identity verification specialist ThisIsMe has expanded its product offering with new products aimed at reducing business risk. They include; PEP (Politically Exposed Persons), Sanctions, Adverse Media Screening, Deeds Check service, Company Lookup and the ultimate KYC...
We all need 21st century data security
Technology created and widely adopted in the 21st century has undoubtedly made our lives easier. It means everyday activities like banking are far less tedious and time-consuming, and that complex, more specialised tasks, like managing a company's finances, are...