Adding threat intelligence to the security mix
Today’s threat landscape is so complex and fast-paced, it is impossible to prevent every threat or attack. The criminal organisations behind cybercrime are well-funded, and have the technical skills to stay ahead of mitigation tools and techniques. They target...
Predictive protection from Sophos
Sophos has announced the availability of Intercept X with malware detection powered by advanced deep learning neural networks. Combined with new active-hacker mitigation, advanced application lockdown, and enhanced ransomware protection, this latest release of the...
Fujitsu helps homeless youth access support
Fujitsu is providing its PalmSecure palm vein recognition technology to the international development and human rights organization itwillbe.org, to help improve the lives and outlook of children living on the streets in India. The Fujitsu palm vein readers were...
How to avoid being scammed
From phishing to identity theft, the invasion of privacy, Internet/ATM/wire fraud, file sharing and piracy, counterfeiting and forgery, child pornography, and hacking -- cybercrime is a chilling and imminent threat across the globe. With botnets, ransomware, spam and...
How to avoid being scammed
From phishing to identity theft, the invasion of privacy, Internet/ATM/wire fraud, file sharing and piracy, counterfeiting and forgery, child pornography, and hacking -- cybercrime is a chilling and imminent threat across the globe. With botnets, ransomware, spam and...
ESET challenges in endpoint protection
ESET has been named as the only Challenger in the 2018 Gartner Magic Quadrant for Endpoint Protection Platforms. ESET was evaluated based on its ability to execute and completeness of vision. The company believes this placement reflects its consistently improved...
Kaspersky scores 100% in ICSA Labs test
With every third enterprise business having faced a targeted attack in the past year, it has become critical for organisations to have a strong advanced threat detection system. That's what the Kaspersky Anti Targeted Attack Platform is designed for and its has...
Check Point debuts Infinity Total Protection
Check Point Software Technologies has announced Infinity Total Protection: a revolutionary security consumption model that enables enterprises to prevent Gen V cyberattacks. The new model utilises Check Point Infinity Architecture components, providing high levels of...
Gemalto’s eSIM embedded in Surface Pro
Gemalto is supplying its eSIM (embedded SIM) solution for Microsoft's Surface Pro with LTE Advanced, which began shipping to business customers in December 2017. Gemalto's partnership with Microsoft enabled Surface to become the first fully integrated embedded SIM PC...
ESET gives a glimpse into FinFisher
Having discovered a wave of surveillance campaigns in several countries in summer 2017, ESET researchers dug deep into the samples of FinFisher. FinFisher, also known as FinSpy, has a history of being used in surveillance campaigns, both against legitimate targets and...
User lock-down or education?
According to the recent PwC report, The Global State of Information Security Survey 2018, companies around the globe are becoming more reliant on cyber capabilities and this means that, in turn, they must also recognise and manage the associated risks, or make...
The special needs of seaports
As a major entry point into countries across the world, seaports are one of the most preferred methods for transporting goods and cargo for international trade, writes Kamal Mokrani, global vice-president at InfiNet Wireless. Clothes, technology, cars and food are...