Kaspersky scores 100% in ICSA Labs test
With every third enterprise business having faced a targeted attack in the past year, it has become critical for organisations to have a strong advanced threat detection system. That's what the Kaspersky Anti Targeted Attack Platform is designed for and its has...
Check Point debuts Infinity Total Protection
Check Point Software Technologies has announced Infinity Total Protection: a revolutionary security consumption model that enables enterprises to prevent Gen V cyberattacks. The new model utilises Check Point Infinity Architecture components, providing high levels of...
Gemalto’s eSIM embedded in Surface Pro
Gemalto is supplying its eSIM (embedded SIM) solution for Microsoft's Surface Pro with LTE Advanced, which began shipping to business customers in December 2017. Gemalto's partnership with Microsoft enabled Surface to become the first fully integrated embedded SIM PC...
ESET gives a glimpse into FinFisher
Having discovered a wave of surveillance campaigns in several countries in summer 2017, ESET researchers dug deep into the samples of FinFisher. FinFisher, also known as FinSpy, has a history of being used in surveillance campaigns, both against legitimate targets and...
User lock-down or education?
According to the recent PwC report, The Global State of Information Security Survey 2018, companies around the globe are becoming more reliant on cyber capabilities and this means that, in turn, they must also recognise and manage the associated risks, or make...
The special needs of seaports
As a major entry point into countries across the world, seaports are one of the most preferred methods for transporting goods and cargo for international trade, writes Kamal Mokrani, global vice-president at InfiNet Wireless. Clothes, technology, cars and food are...
Global cyberattacks amplify focus on security
The most recent global cyber-attacks, WannaCry and Petya, have led to renewed focus on cyber security for business, worldwide, writes Alessandro Postiglioni, head of IT security sales at BT in Africa. The risks remain rife as many boards still struggle to set the...
Users exposed with pirated software
When someone urgently needs to edit a text document or an image, but doesn't have the time or opportunity to find a trusted source, the most probable solution is to download the first openly distributed or even cracked application they can find, which are rife on the...
Threat trends we can expect in 2018
Organisations across the board have been plagued by a number of high-profile breaches in 2017, and it's only going to get worse. Cyber threats are set to worsen, and enterprises find themselves having to deal with complex technologies, sophisticated malware, floods of...
Protect data and devices in the age of mobility and cloud
Digital transformation is touching every sector, industry and organisational size, with SMEs being empowered by digital technologies such as hyperscale cloud computing to gain enterprise-grade services and compete for the same customers as big corporations. By Lionel...
Kaspersky, ENISA boost IoT security recommendations
In November 2017, the European Union Agency for Network and Information Security (ENISA) published "Baseline Security Recommendations for the Internet of Things in the context of critical information infrastructures". The main aim of the study is to offer IoT security...
SA cybersecurity trends for 2018
Cybersecurity is a hot topic in South Africa and in fact, the world over - in the face of recent, highly publicised cybersecurity breaches and the emergence of ransomware as a service (RaaS) which makes the malware accessible to just about anyone with a little...