Intact introduces vulnerability and penetration testing services
Security specialist Intact Software Distribution is adding vulnerability and penetration testing to its range of services. "All companies have cyber security tools and solutions in place, be it anti-malware, a firewall, encryption, data loss prevention, or a variety...
Check Point extends security to Azure
Check Point Software Technologies has announced that its flagship vSEC cloud security solution for Microsoft Azure has been enhanced to support Azure Stack, delivering consistent security across Azure public and hybrid cloud environments. As a Microsoft Azure...
Banking Trojan returns to Google Play
A dangerous Android banking trojan that was first reported by ESET earlier this year has found its way to Google Play, now stealthier than ever. Dubbed BankBot, the banking trojan has been evolving throughout the year, resurfacing in different versions on and outside...
Intact Software Distribution adds Veriato
Specialist security solutions distributor Intact Software Distribution has added Veriato's range of intelligent solutions to its portfolio. With 60% of all cyber-attacks coming from "the inside", Veriato provides organisations with visibility into, and understanding...
Aruba modernises network security
Aruba, a Hewlett Packard Enterprise company, has announced the Aruba 360 Secure Fabric, a security framework that provides 360 degrees of analytics-driven attack detection and response to help organisations reduce risk in a changing threat landscape. Aruba is also...
Ideco launches ‘foolproof’ identity verification
Ideco has unveiled its next generation identity assurance ecosystem, designed to deliver what is describes as fraud-proof trusted identity authentication, confirmed with a digital certificate of authenticity in seconds. Ideco's new Identity-as-a-Service (IDaaS)...
ESET launches Privacy Protection Solutions
ESET South Africa has launched ESET Privacy Protection Solutions. These are tools that an organization can use to achieve digital security that is state of the art, practical and feasible, and which will assist organisations with the Protection of Personal Information...
Security in an increasingly connected world
The Internet of Things (IoT) is rapidly expanding to include a previously undreamed of amount of connected devices - cars, toys, medical devices, home appliances - and all these smart things connecting to the Web have to be secured. Unfortunately, security seems to be...
BlueBorne may affect billions of devices
Fortinet urges caution regarding a new Bluetooth exploit, known as BlueBorne, that has been discovered to exploit a number of Bluetooth vulnerabilities, making billions of devices potentially vulnerable to attack.While there is no evidence that such attack vectors...
Attackers abuse document software
Kaspersky Lab experts have discovered a feature in popular document-creation software that has been abused by attackers to launch successful targeted attacks. Using a malicious application that activates when the simple office document is opened, information about the...
Arbor releases new version of DDoS defence
As Distributed Denial of Service (DDoS) attacks continue to rise dramatically in size, frequency and complexity, it has become clear that automation is now increasingly critical in protecting the network against these attacks. This is according to Arbor Network's...
Strengthening the human weakness
Insider threats are one of the trickiest threats to detect and fight effectively, and are a top concern for businesses of all types, particularly those that house sensitive customer data. Insider threats are even more dangerous, because unlike hackers, they don't have...