Roses are red, violets are blue, safeguard your apps so customers love you
Martin Walshaw, senior systems engineer at F5 Networks, discusses why decision-makers should reconsider their security focus this Valentine's Day. Love is purportedly in the air again, but is it being channelled in the right direction? As customers engage with your...
Cyber security is smarter now
Office 365 missed nearly 1-million spam, phishing, and other e-mails in September 2017 that contained malware of 10-million e-mails verified. By Tallen Harmsen, head of IndigoCube Cyber Security Of that number, the darkreading.com story continues, about 34 000 were...
Sophos in Gartner 2018 Magic Quadrant
Gartner has positioned Sophos as a Leader in its 2018 Magic Quadrant for Endpoint Protection Platforms. Sophos has been positioned as a Leader in all 10 of these reports since they were first published in 2007. In the report, Gartner states that the definition of an...
Adding threat intelligence to the security mix
Today’s threat landscape is so complex and fast-paced, it is impossible to prevent every threat or attack. The criminal organisations behind cybercrime are well-funded, and have the technical skills to stay ahead of mitigation tools and techniques. They target...
Predictive protection from Sophos
Sophos has announced the availability of Intercept X with malware detection powered by advanced deep learning neural networks. Combined with new active-hacker mitigation, advanced application lockdown, and enhanced ransomware protection, this latest release of the...
Fujitsu helps homeless youth access support
Fujitsu is providing its PalmSecure palm vein recognition technology to the international development and human rights organization itwillbe.org, to help improve the lives and outlook of children living on the streets in India. The Fujitsu palm vein readers were...
How to avoid being scammed
From phishing to identity theft, the invasion of privacy, Internet/ATM/wire fraud, file sharing and piracy, counterfeiting and forgery, child pornography, and hacking -- cybercrime is a chilling and imminent threat across the globe. With botnets, ransomware, spam and...
How to avoid being scammed
From phishing to identity theft, the invasion of privacy, Internet/ATM/wire fraud, file sharing and piracy, counterfeiting and forgery, child pornography, and hacking -- cybercrime is a chilling and imminent threat across the globe. With botnets, ransomware, spam and...
ESET challenges in endpoint protection
ESET has been named as the only Challenger in the 2018 Gartner Magic Quadrant for Endpoint Protection Platforms. ESET was evaluated based on its ability to execute and completeness of vision. The company believes this placement reflects its consistently improved...
Kaspersky scores 100% in ICSA Labs test
With every third enterprise business having faced a targeted attack in the past year, it has become critical for organisations to have a strong advanced threat detection system. That's what the Kaspersky Anti Targeted Attack Platform is designed for and its has...
Check Point debuts Infinity Total Protection
Check Point Software Technologies has announced Infinity Total Protection: a revolutionary security consumption model that enables enterprises to prevent Gen V cyberattacks. The new model utilises Check Point Infinity Architecture components, providing high levels of...
Gemalto’s eSIM embedded in Surface Pro
Gemalto is supplying its eSIM (embedded SIM) solution for Microsoft's Surface Pro with LTE Advanced, which began shipping to business customers in December 2017. Gemalto's partnership with Microsoft enabled Surface to become the first fully integrated embedded SIM PC...