Security for Africa’s growing mobile market
With mobile ownership in South Africa and Nigeria now as common as it is in the US, the continent is rapidly gaining ground as the new frontier for mobile. Its young population, ready to embrace the new mobile innovations and technologies, has attracted the attention...
Data security is at the heart of PoPI
As the implementation of the Protection of Personal Information Act (PoPI) gradually comes closer, South African organisations are wondering how best to prepare for it. The key is to understand that data security lies at the heart of PoPI compliance, argues Godfrey...
New technology shows full scope of an attack
Fujitsu Laboratories has developed new technology that, in response to targeted cyber-attacks on specific organisations, rapidly analyses damage status after an attack has been detected. In the event of malware attacks, it was previously necessary to analyse a range...
Why are security operation centres failing?
While definitions vary, generally speaking a security operation centre (SOC) is a central point from where all security issues are dealt with on an organisational and technical level. Typically, it will encompass all the enterprise's information systems - from web...
Ideco to showcase mobile biometrics console
Local biometrics experts Ideco will showcase its new all-in-one mobile biometrics unit at Securex, to be held in Sandton from 24 to 26 May 2016. The solution was recently launched at the connectID 2016 conference and expo in Washington, US. The Biometric Identity...
Fujitsu, BAE collaborate on threat analysis
Fujitsu has worked with BAE Systems - one of the largest US defense companies offering comprehensive threat analytics capabilities for managing threat intelligence, detecting and investigating unknown cyber threats, advanced persistent threats, and zero-day attacks -...
Sophos launches enterprise malware removal tool
Sophos has launched Sophos Clean, the latest addition to its Enduser protection portfolio of advanced malware detection, remediation and removal software. The signature-less technology uses progressive behavior analytics, forensics and collective intelligence to...
Sophos launches enterprise malware removal tool
Sophos has launched Sophos Clean, the latest addition to its Enduser protection portfolio of advanced malware detection, remediation and removal software. The signature-less technology uses progressive behavior analytics, forensics and collective intelligence to...
Fujitsu, BAE collaborate on threat analysis
Fujitsu has worked with BAE Systems - one of the largest US defense companies offering comprehensive threat analytics capabilities for managing threat intelligence, detecting and investigating unknown cyber threats, advanced persistent threats, and zero-day attacks -...
Why network segmentation reduces risk
Organisations need to move back to the days of segmented networks, with the addition of advanced ASIC powered internal segmentation firewalls, to gain full visibility of network traffic and combat growing threats inside their networks, says John Ward, systems...
A security fabric to solve CISOs’ worries
Michael Xie, founder, president and chief technology officer of Fortinet, outlines some solutions to the most common problems facing chief information security officers (CISOs). In my role, I meet many CISOs from around the world. You would think that hailing from...
Total communication protection with Totemo
Communication Genetics has announced the availability of Totemomail and Totemodata, two business-to-business, business-to-consumer and platform-independent solutions designed to protect information on the move, between internal and external sources and between...