Axis intelligent thermal cameras from Duxbury
The Axis range of intelligent thermal cameras, with various analytics applications, is available from Duxbury Networking. The cameras are suited to a wide range of security applications, including physical and virtual perimeter protection around critical...
Fortinet expands security fabric offerings
Fortinet has announced the expansion of Fortinet Security Fabric offerings on Google Cloud Platform, enabling customers to better protect the expanded attack surface of hybrid cloud environments. Adding to its existing FortiGate Next-Generation Firewall offering,...
Gemalto boosts cloud security
Gemalto has announced a next-generation key management solution, SafeNet Virtual KeySecure, for simpler and stronger cloud security. Companies can extend their data protection policies to private and public clouds and centralize encryption and key management...
Machine learning takes on spam
Spam: the bane of the user's existence and the cyber criminal's friend. We've all, at some stage, received these unwanted emails advertising products and services we most certainly have no interest in. Early attempts at blocking spam in the early 2000s produced a...
A guide to effective, robust corporate security
There is a heightened sense of cyber security in the corporate world. Companies are now more aware than ever before of the level of risk they are exposed to and the real danger that sophisticated cyber threats pose. Cyber-criminals are using sophisticated tech-driven...
Solutions for when the kids are home alone
What images do you conjure when thinking about your kids being home alone? By Jaime Siminoff, founder and chief inventor at Ring In the 1990 movie, 8-year-old Kevin is accidentally left alone as his family heads to a vacation destination. His mother has a completely...
Free online webinar on cybersecurity
Large scale ransomware attacks and data breaches have dominated the news recently. "It is clear from these cybersecurity incidents that traditional methods of protection are no longer enough to prevent attacks" says Jeremy Matthews, regional manager of Panda Security...
Gemalto, Entrust Datacard extend partnership
Gemalto and trusted identity and secure transaction technology solutions provider Entrust Datacard have expanded their longstanding partnership to include a secure framework for Internet-connected devices. The new collaboration and integration will allow customers to...
ThisIsMe expands security solution
Identity verification specialist ThisIsMe has expanded its product offering with new products aimed at reducing business risk. They include; PEP (Politically Exposed Persons), Sanctions, Adverse Media Screening, Deeds Check service, Company Lookup and the ultimate KYC...
We all need 21st century data security
Technology created and widely adopted in the 21st century has undoubtedly made our lives easier. It means everyday activities like banking are far less tedious and time-consuming, and that complex, more specialised tasks, like managing a company's finances, are...
SA’s growing cyber threats
Graham Croock, director of BDO IT Advisory Services, gives his opinion on the state of the cyber-security industry in South Africa. During my visit to BDO Norway last week, where I attended a tour of the BDO CERT facility, to personally see the operation of SOC...
Network security 101
The news these days is awash with stories about cyber-attacks and network security. While cybercrime has been around as long as the Internet has, the frequency and sophistication of attacks increase daily. This is not a fad or trend. It is the stark reality facing all...