Will your company be hacked next?
South Africa, like the rest of the world, is facing unprecedented cyber-attacks which have resulted in the crime being the fourth most reported economic crime in the country. In the past year alone, over R3 billion has been lost to cybercrime in South Africa. The...
Impact of insider security threats on financial institutions
By now, anyone that's involved in IT understands that today's cybercriminals aren't simply computer geeks attempting to crash websites and internet-connected devices from their homes. Instead, they're experienced professionals that identify and execute ways to tap...
Ideco adds two-factor authentication
To keep abreast of latest technologies and the ever-evolving security environment, local biometrics solutions provider Ideco has announced enhanced features to its Electronic Visitor Identity Management (EVIM) solution. The company has introduced OTP verification to...
SMEs struggle with security
Even the largest enterprises with unlimited security budgets have an uphill battle against today's clever and sophisticated adversaries, so it's no surprise that small to medium enterprises (SMEs) are struggling to stay ahead of today's threats. Lutz Blaeser, MD of...
Sophos leads in three Magic Quadrant reports
Sophos has once again been positioned in the "Leaders" quadrant of Gartner's latest "Magic Quadrant for Unified Threat Management". The quadrant is based on an assessment of a company's ability to execute, and completeness of vision. Sophos is one of three vendors to...
It’s time to get granular with network access control
The network access control (NAC) market is expanding and evolving constantly in an attempt to deliver truly useful access control across device types, wries Simeon Tassev, MD of Galix Networking. NAC is once again a hot topic in light of the mobile diversity of...
New version of RAA Ransomware updated
Kaspersky Lab experts have discovered a new version of the RAA ransomware, a malware written entirely on JScript. A new trojan delivers victims with a zip archive that contains a malicious .js file. The updated version can also perform offline encryption without the...
The threat landscape has evolved
There are more connected devices, connected people, and connected things than at any time in history and, as the 21st century progresses, this trend is set to continue. For many people, all this innovation is going to make the world a smarter, sharper and more...
Sophos expands cloud-based management platform
Sophos has announced that Sophos Email is now available in its cloud-based Sophos Central management platform. Customers and partners can now manage their email protection solution alongside Sophos endpoint, mobile, web and wireless security products from a unified,...
Securing the smaller enterprise
It comes as no surprise that smaller enterprises are more vulnerable to cyber attack than their larger counterparts. For one, too often they don't see themselves as attractive targets, and secondly, they don't have large budgets to spend on cyber security. Robert...
Security teams need to work with the business
Far too many corporates are not doing enough to secure their digital assets and data. When an incident occurs it is usually blamed on the increasing number of threats, and their growing cleverness and sophistication. "They also blame the rise of state-sponsored...
Security industry should embrace modern PTT
The global security industry is growing at a rapid pace, writes Magnus Hedberg, CEO of GroupTalk. More professional and coordinated operations across disciplines and geographical borders among criminals, is one of the drivers of the increased demand for advanced...