Defending the organisation against spear-phishing
One of the main worries for companies last year was the rise in the use of socially engineered phishing, which caused many organisations to lose thousands of rands, and immeasurable customer confidence. These scams are set to continue in 2016, says Sarel Lamprecht, MD...
Kaspersky Lab tracks 100+ malicious campaigns
There used to only be dozens of threat actors, but the Kaspersky Lab Global Research and Analysis team now tracks the activity of more than a hundred threat actors and sophisticated malicious operations targeting commercial and government organisations in 85...
Sophos debuts shared always-on file encryption
Sophos has announced Sophos SafeGuard Encryption 8, a new synchronized encryption solution that protects data against theft from malware, attackers or accidental leaks. All organisations can now choose to adopt the best practice of "always-on" file-level encryption to...
Credence Security adds five new products
Security solutions provider Credence Security has added five new products to its stable: Digital Guardian, Experian, Fidelis CyberSecurity, RedSeal and Solus. Credence delivers cyber and IT security technologies and solutions that protect organisations against...
The challenge of securing IoT
Connected devices are already counted in the billions, and analysts predict these numbers will hit 6.4 billion worldwide by the end of the year. While there's plenty of business potential in these expanding connections, there's a big downside however - with security...
RSA unveils SecurID Suite
RSA, The Security Division of EMC, has unveiled its RSA SecurID Suite, which is a comprehensive identity solution that combines the separate disciplines of access, governance, lifecycle and identity assurance, working together in harmony. As a result, organisations...
The security platform of tomorrow is here
Video Management Systems (VMS) arrived 15 years ago and have been one of the top technologies to transform the IP video surveillance market. Modern VMS has evolved substantially from its start as a simple surveillance system offering video data recording and playback,...
Securing Smart Cities grows three-fold in year one
Just a year has passed since Securing Smart Cities - a not-for-profit global initiative that aims to raise awareness and solve the existing and future cybersecurity problems of smart cities - was launched. Since that time the initiative's supporting community has...
New solution to beat identity theft
Some experts call biometrics the answer to identity theft. Biometric verification is a process of identity authentication that is used to confirm identity through uniquely detectable biological traits and may be an effective tool in the war on crime. With the drastic...
Total data erasure and hard drive destruction
An increasing number of government regulations, industry standards and internal risk mitigation policies require organisations to sanitise storage media prior to disposal or reuse. Xperien has now introduced a hard drive degausser and physical destroyer, specifically...
Tips for managing BYOD security
BYOD has been a hot trend for some time now. More and more workers are using their personal cellphones and tablets to access company data. In fact, Gartner predicts that by 2017, 50% of businesses will require their staff to supply their own devices for business...
Secure your cellphone data
Cyber forensics expert, Preeya Ramjee, has cautioned cellphone users to be vigilant about securing the data on their mobile phones following a sharp rise in cyber theft over the past few years. While cellphones have transformed the way we work and live, they also...