RSA adds realtime behaviour analytics
RSA, The Security Division of EMC, has announced that RSA Security Analytics now offers a real-time behaviour analytics engine that is designed to expedite detection of advanced attack activities. Using machine learning techniques, the engine is built to able to...
Integrated security key for sophisticated attacks
South African companies need to automate and integrate their IT security solutions to meet increasingly sophisticated threats, writes Intel Security's Trevor Coetzee. The trends and threats encountered by South African companies are largely those of our global...
Trend Micro Cloud App Security is more sharing
Business cloud users are estimated to grow from 50-million in 2013 to 695-million by 2022, making data security a top operational concern for organisations transitioning to the cloud. Trend Micro has announced the expansion of its Cloud App Security solution to Box,...
Kaspersky Lab launches security intelligence services
Kaspersky Lab has expanded its enterprise portfolio with the launch of Security Intelligence Services - a diverse set of services aimed at faster sharing of leading security expertise and transforming knowledge into protection for its clients. Aimed primarily at...
Kaspersky Lab secure testing top spot
Kaspersky Lab has claimed top spot in the TOP3 metric for Internet security for the third year in a row, proving that its products offer the best protection from cyberthreats in the industry. Kaspersky Lab products scored more top-three places than any other vendor in...
IT among the top operational risks in 2016
Information technology accounts for two of the Top 10 Operational Risks for 2016 identified by risk.net while interviewing chief risk officers, heads of operational risk and other operation risk practitioners at financial services firms, banks, insurers and asset...
Protect against new ransomware threat
A new strain of ransomware came to the fore, dubbed Locky because of the way it renames the file extension. Locky targets users via email attachments, which is often an invoice in a Microsoft Word document. Once the recipient downloads the file, if Office macros are...
Fortinet launches cyber threat assessment programme
Fortinet has unveiled its new Cyber Threat Assessment Program (CTAP) designed to provide organizations a detailed look into the type and amount of cyber threats posing risks to their networks, yet are going undetected by their existing security solutions. This new...
Relentless threats drive managed security demand
Arbor Networks, the security division of NetScout, has released its 11th Annual Worldwide Infrastructure Security Report (WISR) offering direct insights from the global operational security community on a comprehensive range of issues, from threat detection and...
Vox Telecom launches Kaspersky Endpoint Security for business
Vox Telecom has launched Kaspersky Endpoint Security for Business to provide endpoint protection for all virtual, physical and mobile devices within its SME and corporate customers. "Technology advances, and evolution of the Internet leaves businesses more exposed to...
Risks in the Fourth Industrial Revolution
Martin Walshaw, senior engineer at F5 Networks, looks at some of the unintended consequences of the Fourth Industrial Revolution that we might be heading towards. You haven't been feeling well this week. You make an appointment with your doctor, who's actually a...
RSA Via solution gains momentum
RSA, the Security Division of EMC, says that its RSA Via portfolio of identity products, and specifically RSA Via Access, is gaining momentum in the marketplace. What's more: customers, partners, technology integrators and analysts are loudly voicing their support....