Ideco launches ‘foolproof’ identity verification
Ideco has unveiled its next generation identity assurance ecosystem, designed to deliver what is describes as fraud-proof trusted identity authentication, confirmed with a digital certificate of authenticity in seconds. Ideco's new Identity-as-a-Service (IDaaS)...
ESET launches Privacy Protection Solutions
ESET South Africa has launched ESET Privacy Protection Solutions. These are tools that an organization can use to achieve digital security that is state of the art, practical and feasible, and which will assist organisations with the Protection of Personal Information...
Security in an increasingly connected world
The Internet of Things (IoT) is rapidly expanding to include a previously undreamed of amount of connected devices - cars, toys, medical devices, home appliances - and all these smart things connecting to the Web have to be secured. Unfortunately, security seems to be...
BlueBorne may affect billions of devices
Fortinet urges caution regarding a new Bluetooth exploit, known as BlueBorne, that has been discovered to exploit a number of Bluetooth vulnerabilities, making billions of devices potentially vulnerable to attack.While there is no evidence that such attack vectors...
Attackers abuse document software
Kaspersky Lab experts have discovered a feature in popular document-creation software that has been abused by attackers to launch successful targeted attacks. Using a malicious application that activates when the simple office document is opened, information about the...
Arbor releases new version of DDoS defence
As Distributed Denial of Service (DDoS) attacks continue to rise dramatically in size, frequency and complexity, it has become clear that automation is now increasingly critical in protecting the network against these attacks. This is according to Arbor Network's...
Strengthening the human weakness
Insider threats are one of the trickiest threats to detect and fight effectively, and are a top concern for businesses of all types, particularly those that house sensitive customer data. Insider threats are even more dangerous, because unlike hackers, they don't have...
Aruba modernises network security
Aruba, a Hewlett Packard Enterprise company, has announced the Aruba 360 Secure Fabric, a security framework that provides analytics-driven attack detection and response to help organisations reduce risk in today's changing threat landscape. Aruba is also innovating...
Now for the body-worn camera
Across the globe, security technology is constantly developed, improved upon and provided in order to create an environment that is truly safe and secure. According to a report issued by the Overseas Security Advisory Council (OSAC), violent crime remains an...
Mobile network security calls for new services
It has become more common these days to hear about the latest security breach or denial of service (DOS) attack, which highlights the many challenges businesses face as they look to curb an increasing number of attacks passing through their IT networks. In the telecom...
Kaspersky Lab debuts new consumer line-up
Kaspersky Lab has launched updated versions of its consumer flagship products. The updated Kaspersky Internet Security ensures even better protection against ransomware, is able to protect Mac computers while using public Wi-Fi networks and also offers an extra layer...
Disrupt cyber-attacks before they disrupt you
Dimension Data and Cisco, have jointly published a white paper to help organisations stay ahead of ransomware threats. Called "Ransomware: The Pervasive Business Disruptor", the paper looks at ransomware trends and impacts, and how to respond before a threat becomes a...