Ideco to showcase mobile biometrics console
Local biometrics experts Ideco will showcase its new all-in-one mobile biometrics unit at Securex, to be held in Sandton from 24 to 26 May 2016. The solution was recently launched at the connectID 2016 conference and expo in Washington, US. The Biometric Identity...
Fujitsu, BAE collaborate on threat analysis
Fujitsu has worked with BAE Systems - one of the largest US defense companies offering comprehensive threat analytics capabilities for managing threat intelligence, detecting and investigating unknown cyber threats, advanced persistent threats, and zero-day attacks -...
Sophos launches enterprise malware removal tool
Sophos has launched Sophos Clean, the latest addition to its Enduser protection portfolio of advanced malware detection, remediation and removal software. The signature-less technology uses progressive behavior analytics, forensics and collective intelligence to...
Sophos launches enterprise malware removal tool
Sophos has launched Sophos Clean, the latest addition to its Enduser protection portfolio of advanced malware detection, remediation and removal software. The signature-less technology uses progressive behavior analytics, forensics and collective intelligence to...
Fujitsu, BAE collaborate on threat analysis
Fujitsu has worked with BAE Systems - one of the largest US defense companies offering comprehensive threat analytics capabilities for managing threat intelligence, detecting and investigating unknown cyber threats, advanced persistent threats, and zero-day attacks -...
Why network segmentation reduces risk
Organisations need to move back to the days of segmented networks, with the addition of advanced ASIC powered internal segmentation firewalls, to gain full visibility of network traffic and combat growing threats inside their networks, says John Ward, systems...
A security fabric to solve CISOs’ worries
Michael Xie, founder, president and chief technology officer of Fortinet, outlines some solutions to the most common problems facing chief information security officers (CISOs). In my role, I meet many CISOs from around the world. You would think that hailing from...
Total communication protection with Totemo
Communication Genetics has announced the availability of Totemomail and Totemodata, two business-to-business, business-to-consumer and platform-independent solutions designed to protect information on the move, between internal and external sources and between...
New tool frees CryptXXX-encrypted files
A Kaspersky Lab expert has developed a decryption tool to help victims of CryptXXX restore encrypted files. The particularly malicious CryptXXX ransomware targets Windows devices in order to lock files, copy data and steal Bitcoins. The CryptXXX ransomware is...
It’s 2016: why aren’t you using encryption?
Encryption has this kind of reputation that it's complicated. It's not. It's very, very simple. There should be no reason why an organization shouldn't be encrypting its data in 2016, writes Neil Cosser, identity and data protection manager: Africa at Gemalto. The...
Fortinet delivers next-generation performance
Fortinet has announced the expansion of its Security Fabric with introduction of the FortiGate 6040E enterprise firewall. "Enterprises are being disproportionally impacted as the adoption of cloud services and growth in remote access to corporate networks have eroded...
Why has banking fraud not been stopped?
As banking fraud appears to be on the increase, more and more people are asking why it is almost impossible for banks to stop this scourge. This is according to Tjaart van der Walt, Truteq Group CEO and international MD. Truteq Group also boasts offices in Pretoria...