Sophos XG Firewall improves network visibility
Sophos has announced the latest version of its next-generation Sophos XG Firewall that delivers a breakthrough in network traffic visibility. Using Synchronised Security to obtain information from the endpoint, XG Firewall can identify, classify and allow the control...
Small businesses still cybercrime targets
We've seen a great deal of threats highlighted this year, as well as information leaks, IoT botnets and some very evasive ransomware. One could argue that strains of malware are evolving and cyber criminals are becoming bolder. Ransomware is particularly rife and...
Ways to fight ransomware
Today, there's a good chance you know of either an individual or a company who has fallen victim to ransomware. In fact, unless you have been living in the Amazon jungle with no connectivity, you will have heard of the simple, yet terrifying concept of ransomware....
Tips for software cybersecurity
Protecting sensitive client information has never been more important, as data breaches and hacks become more prevalent. The heated commentary on South Africa's Cybercrimes and Cybersecurity Bill, the petition against it and the increased risk of global cyberattacks...
Kaspersky, Marsh offer cybersecurity audits
Kaspersky Lab and Marsh -- a global leader in insurance broking and risk management - have signed a memorandum of understanding covering the insurance of industrial organisations. The first step of the collaboration will involve collaboration in the field of...
XON, NEC Africa deliver integrated defence centre
XON and NEC Africa will launch their joint Cyber Defence Operation Centre (CDOC), the only such facility from a single service provider in Africa that offers end-to-end physical and cyber defence services, with all the underlying IT infrastructure necessary for a...
How to protect your data
South Africa has just been hit by the worst data breach in its history. The personal information of more than 30-million South Africans - more than half of the total population - has leaked online, potentially causing identity theft for each one of the affected...
DDoS results in a buyers’ market
It's a buyers' market in the local property arena at the moment, according to certain industry experts. This is largely as a result of the slower economy, which has seen a rise in the number of properties for sale. Globally, it's a buyer's market as well when we look...
Rooting out malicious insiders
The danger of suffering a security breach has never been more of a reality for businesses across the board. Employees today access, process, and manage privileged data more than ever as part of their daily jobs, putting companies at risk of malicious activity,...
Mobile security: there’s a missing puzzle piece
With mobile malware and ransomware proliferating at a rapid rate, companies are recognizing the need for security technologies to protect network resources accessed by employees with their devices. But, they're missing an important piece of the puzzle. "A mobile...
ESET works with Google to halt malware
ESET has launched Chrome Cleanup, a new scanner and cleaner for Google Chrome designed to help users browse the web safely and without interruption. Chrome Cleanup will be available for all Google Chrome users running on Windows. As cyber-attacks become more complex...
Outwit cyber opponents with integrated threat intelligence
Even though cyber security has been put under the microscope, and in spite of years of experience and cyber security investments, organisations continue to struggle with security analytics and operations. This is the word from Arbor Network's territory manager for...