The security platform of tomorrow is here
Video Management Systems (VMS) arrived 15 years ago and have been one of the top technologies to transform the IP video surveillance market. Modern VMS has evolved substantially from its start as a simple surveillance system offering video data recording and playback,...
Securing Smart Cities grows three-fold in year one
Just a year has passed since Securing Smart Cities - a not-for-profit global initiative that aims to raise awareness and solve the existing and future cybersecurity problems of smart cities - was launched. Since that time the initiative's supporting community has...
New solution to beat identity theft
Some experts call biometrics the answer to identity theft. Biometric verification is a process of identity authentication that is used to confirm identity through uniquely detectable biological traits and may be an effective tool in the war on crime. With the drastic...
Total data erasure and hard drive destruction
An increasing number of government regulations, industry standards and internal risk mitigation policies require organisations to sanitise storage media prior to disposal or reuse. Xperien has now introduced a hard drive degausser and physical destroyer, specifically...
Tips for managing BYOD security
BYOD has been a hot trend for some time now. More and more workers are using their personal cellphones and tablets to access company data. In fact, Gartner predicts that by 2017, 50% of businesses will require their staff to supply their own devices for business...
Secure your cellphone data
Cyber forensics expert, Preeya Ramjee, has cautioned cellphone users to be vigilant about securing the data on their mobile phones following a sharp rise in cyber theft over the past few years. While cellphones have transformed the way we work and live, they also...
New firewall helps identify risk-prone network users
A new firewall offering from the Sophos Group is now available from Duxbury Networking. Dubbed the XG Firewall, it is designed to provide unprecedented visibility into the corporate network. With the ability to provide detailed, actionable intelligence on user...
You’ve been hacked, now what?
LinkedIn, Sony, the Clinton Foundation and many other companies have all been in the headlines for the past few years because they have been hacked - and users' details disseminated. The usual response to this sort of attack is for companies to increase security, put...
Fortinet achieves 99,9% security effectiveness score
NSS Lab's recent Data Centre Intrusion Prevention System (DCIPS) report and its Security Value Map reveals that Fortinet's FortiGate 3000D earned the highest ratings for Security Effectiveness, blocking 99,9% of exploits, and TCO (Total Cost of Ownership) per...
Kaspersky demystifies advanced cyber threats
A few years from now someone will start writing the history of advanced, highly sophisticated cyber threats, writes Ovanes Mikhaylov, MD: emerging markets at Kaspersky Lab. This person will obviously start with Stuxnet, and go through the findings of campaigns like...
Visibility is top defence against targeted attacks
As cyber criminals become more tactical, moving away from the 'spray and pray approach' to more focused and targeted attacks, visibility and scrubbed traffic become essential components of a security strategy for protecting companies, writes Martin Walshaw, senior...
Cyber-security is an ongoing battle
The 'Nigerian Prince' or '419' email scams we've all seen take advantage of the age-old premise: people can be greedy and gullible. Or to put it more positively - people are intrinsically positive about the motives of others and are not on the lookout for scammers and...