Low-tech attackers use open source tools
Kaspersky Lab researchers have uncovered a new trend among cyberespionage threat actors: instead of developing customised hacking tools or buying them from third-party suppliers on the criminal underground, they are using tools available on the web for research...
How to protect your customer documents
The steady digitisation of customer service and engagement processes in banking, insurance, telecomms and utilities has brought about significant improvements in efficiency and customer experience, writes Alison Treadaway, director of Striata. Being able to customise...
Fortinet Security Fabric for pervasive security
Fortinet has unveiled its Security Fabric, an integrated, collaborative, and adaptive architecture designed to deliver distributed security for global enterprises providing protections against threats from IoT and remote devices, through the infrastructure core, and...
ElevenPaths adds Check Point solutions
Check Point Software Technologies has announced that ElevenPaths, a Telefónica company specialising in development of innovative security solutions, will be a provider of Check Point mobile security technologies for Telefónica corporate customers worldwide. The...
Companies still fail to protect data
Despite their having comprehensive information security and data protection policies in place, most South African businesses are still wide open to data theft and misuse, says Mervyn Mooi, director at the Knowledge Integration Dynamics Group. Numerous pieces of...
Credence Security, NetClean highlight child sexual abuse
With April being Child Abuse Awareness Month, businesses in South Africa should more than ever be doing their bit to combat the scourge of child abuse images on the Web. The vast majority of companies around the world and locally have tools and technologies in place...
Data security on and offline
To keep up with technology and improve efficiencies, companies are constantly replacing outdated IT equipment. However, this creates a challenge as large amounts of excess electronics must be managed and disposed of properly. The problem with IT asset disposal...
Gemalto’s SDK gets ANSSI certification
Gemalto's Ezio Mobile Software Development Kit (SDK), has achieved security certification from the well-recognised ANSSI governmental agency for network and information security. Ezio Mobile SDK acts as an extra layer of security and is a simple, comprehensive and...
10 steps to protect against ransomware
If you've been listening to the news at all the past couple of weeks, you have undoubtedly heard of a number of companies being affected by ransomware, writes Paul Williams, major account manager at Fortinet. The recent surge in this form of cyber attack has many...
SSL: The unchecked security blind spot
When changing lanes on the highway, you would first indicate to make other drivers aware of your intentions and then check your blind spot to make sure it was safe to switch lanes, writes Martin Walshaw, senior engineer at F5 Networks. Those safety measures, which...
Malvertising: when advertising becomes dangerous
Over the last several months, the BBC, the New York Times, and other major news and commercial websites became victims of malvertising attacks, writes Doros Hadjizenonos, country manager of Check Point South Africa What exactly is malvertising? To understand this type...
Dell tackles remote workforce challenges
Dell has announced updates to the SonicWALL Secure Mobile Access (SMA) operating system (OS) that provide remote workers using smartphones, tablets or laptops - managed or unmanaged - with policy-enforced SSL VPN access to mission-critical applications, data and...