Sophos launches enterprise malware removal tool
Sophos has launched Sophos Clean, the latest addition to its Enduser protection portfolio of advanced malware detection, remediation and removal software. The signature-less technology uses progressive behavior analytics, forensics and collective intelligence to...
Sophos launches enterprise malware removal tool
Sophos has launched Sophos Clean, the latest addition to its Enduser protection portfolio of advanced malware detection, remediation and removal software. The signature-less technology uses progressive behavior analytics, forensics and collective intelligence to...
Fujitsu, BAE collaborate on threat analysis
Fujitsu has worked with BAE Systems - one of the largest US defense companies offering comprehensive threat analytics capabilities for managing threat intelligence, detecting and investigating unknown cyber threats, advanced persistent threats, and zero-day attacks -...
Why network segmentation reduces risk
Organisations need to move back to the days of segmented networks, with the addition of advanced ASIC powered internal segmentation firewalls, to gain full visibility of network traffic and combat growing threats inside their networks, says John Ward, systems...
A security fabric to solve CISOs’ worries
Michael Xie, founder, president and chief technology officer of Fortinet, outlines some solutions to the most common problems facing chief information security officers (CISOs). In my role, I meet many CISOs from around the world. You would think that hailing from...
Total communication protection with Totemo
Communication Genetics has announced the availability of Totemomail and Totemodata, two business-to-business, business-to-consumer and platform-independent solutions designed to protect information on the move, between internal and external sources and between...
New tool frees CryptXXX-encrypted files
A Kaspersky Lab expert has developed a decryption tool to help victims of CryptXXX restore encrypted files. The particularly malicious CryptXXX ransomware targets Windows devices in order to lock files, copy data and steal Bitcoins. The CryptXXX ransomware is...
It’s 2016: why aren’t you using encryption?
Encryption has this kind of reputation that it's complicated. It's not. It's very, very simple. There should be no reason why an organization shouldn't be encrypting its data in 2016, writes Neil Cosser, identity and data protection manager: Africa at Gemalto. The...
Fortinet delivers next-generation performance
Fortinet has announced the expansion of its Security Fabric with introduction of the FortiGate 6040E enterprise firewall. "Enterprises are being disproportionally impacted as the adoption of cloud services and growth in remote access to corporate networks have eroded...
Why has banking fraud not been stopped?
As banking fraud appears to be on the increase, more and more people are asking why it is almost impossible for banks to stop this scourge. This is according to Tjaart van der Walt, Truteq Group CEO and international MD. Truteq Group also boasts offices in Pretoria...
Low-tech attackers use open source tools
Kaspersky Lab researchers have uncovered a new trend among cyberespionage threat actors: instead of developing customised hacking tools or buying them from third-party suppliers on the criminal underground, they are using tools available on the web for research...
How to protect your customer documents
The steady digitisation of customer service and engagement processes in banking, insurance, telecomms and utilities has brought about significant improvements in efficiency and customer experience, writes Alison Treadaway, director of Striata. Being able to customise...