Avaya’s network segmentation secures the perimeter
Avaya is announcing a new foundational approach to network security that helps reduce the growing number of breaches that compromise data integrity and privacy. The new approach enables organisations to create stealth, hyper-segments within their networks that are...
Century City automates access control
Century City Property Owners Association (CCPOA), the body responsible for the day to day running of Century City, a 250ha mixed-use development in Cape Town, has reinforced its access control and security with the deployment of new technology from South African...
Will your company be hacked next?
South Africa, like the rest of the world, is facing unprecedented cyber-attacks which have resulted in the crime being the fourth most reported economic crime in the country. In the past year alone, over R3 billion has been lost to cybercrime in South Africa. The...
Impact of insider security threats on financial institutions
By now, anyone that's involved in IT understands that today's cybercriminals aren't simply computer geeks attempting to crash websites and internet-connected devices from their homes. Instead, they're experienced professionals that identify and execute ways to tap...
Ideco adds two-factor authentication
To keep abreast of latest technologies and the ever-evolving security environment, local biometrics solutions provider Ideco has announced enhanced features to its Electronic Visitor Identity Management (EVIM) solution. The company has introduced OTP verification to...
SMEs struggle with security
Even the largest enterprises with unlimited security budgets have an uphill battle against today's clever and sophisticated adversaries, so it's no surprise that small to medium enterprises (SMEs) are struggling to stay ahead of today's threats. Lutz Blaeser, MD of...
Sophos leads in three Magic Quadrant reports
Sophos has once again been positioned in the "Leaders" quadrant of Gartner's latest "Magic Quadrant for Unified Threat Management". The quadrant is based on an assessment of a company's ability to execute, and completeness of vision. Sophos is one of three vendors to...
It’s time to get granular with network access control
The network access control (NAC) market is expanding and evolving constantly in an attempt to deliver truly useful access control across device types, wries Simeon Tassev, MD of Galix Networking. NAC is once again a hot topic in light of the mobile diversity of...
New version of RAA Ransomware updated
Kaspersky Lab experts have discovered a new version of the RAA ransomware, a malware written entirely on JScript. A new trojan delivers victims with a zip archive that contains a malicious .js file. The updated version can also perform offline encryption without the...
The threat landscape has evolved
There are more connected devices, connected people, and connected things than at any time in history and, as the 21st century progresses, this trend is set to continue. For many people, all this innovation is going to make the world a smarter, sharper and more...
Sophos expands cloud-based management platform
Sophos has announced that Sophos Email is now available in its cloud-based Sophos Central management platform. Customers and partners can now manage their email protection solution alongside Sophos endpoint, mobile, web and wireless security products from a unified,...
Securing the smaller enterprise
It comes as no surprise that smaller enterprises are more vulnerable to cyber attack than their larger counterparts. For one, too often they don't see themselves as attractive targets, and secondly, they don't have large budgets to spend on cyber security. Robert...