New firewall helps identify risk-prone network users
A new firewall offering from the Sophos Group is now available from Duxbury Networking. Dubbed the XG Firewall, it is designed to provide unprecedented visibility into the corporate network. With the ability to provide detailed, actionable intelligence on user...
You’ve been hacked, now what?
LinkedIn, Sony, the Clinton Foundation and many other companies have all been in the headlines for the past few years because they have been hacked - and users' details disseminated. The usual response to this sort of attack is for companies to increase security, put...
Fortinet achieves 99,9% security effectiveness score
NSS Lab's recent Data Centre Intrusion Prevention System (DCIPS) report and its Security Value Map reveals that Fortinet's FortiGate 3000D earned the highest ratings for Security Effectiveness, blocking 99,9% of exploits, and TCO (Total Cost of Ownership) per...
Kaspersky demystifies advanced cyber threats
A few years from now someone will start writing the history of advanced, highly sophisticated cyber threats, writes Ovanes Mikhaylov, MD: emerging markets at Kaspersky Lab. This person will obviously start with Stuxnet, and go through the findings of campaigns like...
Visibility is top defence against targeted attacks
As cyber criminals become more tactical, moving away from the 'spray and pray approach' to more focused and targeted attacks, visibility and scrubbed traffic become essential components of a security strategy for protecting companies, writes Martin Walshaw, senior...
Cyber-security is an ongoing battle
The 'Nigerian Prince' or '419' email scams we've all seen take advantage of the age-old premise: people can be greedy and gullible. Or to put it more positively - people are intrinsically positive about the motives of others and are not on the lookout for scammers and...
How to address critical infrastructure vulnerabilities
Almost 80% of industrial security incidents in critical infrastructure organisations are caused by unintentional internal issues such as software misconfigurations from human error and malfunctioning network protocols, according to Fortinet. Critical infrastructure...
How many cyber-heists go unreported?
Between the hours of 5am and 8am Japan time on 15 May last month, cyber attackers used compromised card details of customers from a Tier 1 bank in Africa to make transactions on a number of customer accounts. Well over 100 cyber crooks made physical cash withdrawals...
Big increase in active malware families
Check Point Software Technologies has published its latest Threat Index for May 2016, revealing that the number of active global malware families increased by 15% in May 2016. The May Threat Index presents a mixed view of Africa, with several countries making quite...
Netxactics now offers Thycotic PAM solutions
Security solution distributor, Netxactics, has announced availability of the Thycotic range of Privileged Account Management (PAM) software solutions. This is the first time the product set is available locally, and offers protection against cyber-attacks that use...
Common misconceptions around information security
Every time the headlines flood with a new story about a breach at a major organisation, the assumption is that the attackers got in due to a high level of sophistication, or through careful studying of their target looking for the weakest link in the security chain....
How SMMEs can maximise IT security
As the bulk of the South African economy is made up of SMMEs, it is important that cash-strapped IT managers take steps to ensure that their businesses are protected against malicious attacks. Steve Buck, director of Edgetec, says current market conditions are tough...