Bitdefender 2017 offers protection across any OS, device
Today's evolving threat landscape, where the criminals are getting more and more sophisticated and cunning, is driving the need for total security solutions that protect all devices, irrespective of operating system or manufacturer. With this in mind, Bitdefender has...
Internet of Things or Internet of Threats?
Martin Walshaw, senior engineer at F5 Networks, outlines five security trends to ensure businesses are adequately protected over the Christmas break. As businesses unwind for the holidays, many may take stock of the multiple data breaches, which exposed both corporate...
Keep pace with the changing fraud landscape
While many businesses acknowledge the growing threat of fraud, more can be done to beat this crime - and win customers, writes Keith Wardell, head of commercial strategy for Experian South Africa. In the current day and age, it is surprising that businesses still...
Mindset change required to mitigate cyber attacks
Network security is a global risk and enterprises are spending millions on securing their corporate networks, yet they are still being attacked. Greg de Chasteauneuf, chief technology officer at Saicom Voice Services takes a look at why there needs to be a mindset...
Shamoon rebooted?
It seems that the Shamoom cyber-attacks have returned, according to this blog post co-written by Raj Samani, chief technology officer: EMEA at Intel Security, and Christiaan Beek. We have recently received notifications and samples from impacted organisations in the...
Kaspersky Safe Kids gives kids flexibility
Kaspersky Lab has complemented its solution to protect children against digital threats with new features for iOS and Android platforms. Now, children can remotely ask parents for access to a restricted site or app with the touch of a button, while parents receive...
Embrace the breach, rethink the threat landscape
The app is no longer fixed in one location. Where the app goes, so too should protection, says Martin Walshaw, senior engineer at F5 Networks . Applications are the gateway to our data. Whether at work or in the home, the way we manage private information is critical...
Kenya cyber attacks growing in sophistication
It '' s not only the frequency of the cyber attacks happening in Kenya at the moment, but also the size and sophistication of these assaults that government and business need to face up to. The hacking of Kenya '' s government in November 2016 has highlighted the...
Protect your online identity
TrackOFF, a consumer privacy company that builds best-in-class tools to secure users' identities and personal data, has launched in South Africa and now offers a localised service to citizens. The local service, available immediately, combats tracking technology, such...
Tighten up security this festive season
With so many homes and businesses left vacant during the festive season, a Western Cape Business Woman is urging people to make use of technology to assist in protecting their properties while away. "Any incidents at home is the last thing you want to come back to...
Become more cyber savvy and secure online
For the everyday internet user, becoming more cyber savvy is vital. Just as we invest in personal security and keep our wits about us as we move around, so too must we be alert to threats online. Fortunately, becoming more better informed and protecting our online...
Protect IP video systems from summer storms
The majority of all surge-induced damage to IP video cameras and equipment is caused by surges travelling along unprotected data and power lines. Marc van Jaarsveldt, consultant at The Surveillance Factory, says these surges originate from static charge build-up,...