Prepare for the threat of exponentially expanding data
At the turn of the previous century, fears ran rampant that PCs would fall victim to the fabled Y2K bug, plunging a very computer dependent world into instant chaos. That may have been a storm in a teacup, but now there is a very real consideration that needs to be...
Secure your organisation from insider threats
Living in an increasingly networked world has its advantages, but it also leaves organisations vulnerable to exploitation by malware, inadvertent employee actions and malicious attacks. Data security breaches can be devastating in terms of cost and reputation so...
Kaspersky Total Security multi-device adds kid safety
Kaspersky Lab has unveiled the latest version of its Kaspersky Total Security - multi-device. Thanks to Kaspersky Safe Kids included, the new product will not only protect privacy and confidential information of users but also allow parents to better monitor...
What are the cyber-threats in the financial sector?
Cyber threats can be broadly categorised as either a Computer Network Attack (CNA) - aiming for the disruption, degradation or destruction of information and systems; or Computer Network Exploitation (CNE) - which focuses on accessing, stealing and exploiting...
Balance security with customer experience
Identity theft is on the rise. According to TransUnion, every minute 19 people fall victim to fraud. Targeting anything from banking to mobile phone accounts, prying thieves are becoming more sophisticated when it comes to stealing identities and turning a profit. The...
Start-up looks at security differently
A small start-up in Fourways, Johannesburg, is changing the face of security providers nationwide. Specialising in technical installations across the niche world of business and personal security, Security Brokerz is providing customers around the country with a...
Time to match cyber-attacks with a better defense
Craig Rosewarne, MD of Wolfpack Information Risk, delves into the world of cybercrime threats that South Africa faces in 2016, as well as how the pending Cybersecurity Bill might take some of the pressure off business. According to the 2015 International Business...
Beyond the wall, bringing security inside
In 2015, 707-million data records were compromised--more than 80 000 every hour. With data's increasing importance attracting cyber-criminals in swarms, old-style perimeter security is no longer adequate. A new security mindset is required, delegates at the recent...
ESET warns against a wave of infected e-mails
After recent activity and research around the world, ESET has managed to detect a malicious downloader under the name Nemucod and warns users about an increased number of infected emails containing a malicious attachment, which downloads and installs ransomware onto...
Kaspersky Lab, WISeKey launch encrypted mobile vault
Kaspersky Lab and WISeKey, a Swiss based cyber-security company, have announced the release of a special edition of the cyber-resilience app, WISeID Kaspersky Lab Security. This new edition integrates the best technologies from both cyber-security companies to offer...
Faster-moving attacks threaten enterprises
High speed networks, an exponential increase in the number of endpoints, and a more tech-savvy employee base mean a great deal more risk for enterprises, says Fortinet. Addressing a media round table in Rosebank, Fortinet Africa executives said the risks to enterprise...
Sophos e-mail appliance adds next-generation sandboxing
Sophos has announced that its Email Appliance now includes Sophos Sandstorm, an advanced, next-generation sandboxing technology that quickly and accurately detects, blocks and responds to sophisticated, constantly-changing cyber threats. Sophos Sandstorm is an...