DDoS protection needs a multi-faceted approach
With distributed denial of service (DDoS) attacks becoming more complex and sophisticated, so must any defensive strategy that attempts to fully protect a financial institution. This is according to Arbor Networks, the security division of Netscout. While traditional...
Fighting the scourge of blog spam
Back in the late 90s, a new type of journalism emerged, alongside the advent of free publishing platforms. At the time, no one knew blogging would become one of the most important platforms of expression, and the sharing of news and ideas, forever altering the face of...
Battling the enemy within
The world moves swiftly; the IT security world even more so. Just a couple of years ago, securing the enterprise would basically consist of protecting an organization from external intruders. Today, the battle has changed ground. By Michael Xie, founder, president and...
IndigoCube, Gemalto join forces to tackle data security
Data security solutions supplier Gemalto has appointed IndigoCube as a partner in the Southern Africa region. The two companies will kick off their collaboration with a joint Data Security Summit on 3 March at the Radisson Blue Gautrain Hotel in Johannesburg. "Data...
NEC adds to security portfolio
NEC has announced the official launch of a Cyber Security Factory in Singapore as the latest addition to its global portfolio of security operation centres. In 2014, NEC established its first Cyber Security Factory in Japan as a specialized unit dedicated to...
Kaspersky uncovers Russian spear-phishing
Kaspersky Lab's Global Research and Analysis Team has discovered signs of previously unknown attacks by the Russian-speaking BlackEnergy APT group. A spear-phishing document found by the company's experts mentions the far-right Ukrainian nationalist political party...
How to protect your device from mobile malware
Mobile malware is on the increase and the purpose of almost all of it is to generate income for cybercriminals. Some malware can monitor devices for banking transactions, gathering sensitive details like passwords and account numbers. Quite common is malware that...
How to build a successful application-security programme
Although #Great (corporate) Wall of China never trended on underworld Twitter sites, so far as we know, there's no real doubt that firewalls have well and truly failed as effective ways to secure corporate systems and data. The number of breaches reported daily...
Cybercrime is the new reality
"Were you a victim of cybercrime last year?" asks Anton Jacobsz, MD of Networks Unlimited. "It is a valid question to ask just about any business these days as technical sophistication and reasons for cybercrime have evolved significantly in the past 12 months." He...
WISeKey, Kaspersky partner to keep wearables safe
With smart watches, fitness trackers and payment wristbands expected to account for one in five mobile payment transactions by 2020 - representing $500 billion a year* - it is inevitable that they will become a growing target for cyber-attack, according to WISeKey and...
Security predictions for 2016
2015 was not the best year for cyber-security. Thomas Fischer, principal threat rfor Digital Guardian, looks at the highest profile hacks of 2015 and how cyber security will evolve in 2016. An increase in Wiper attacks Wiper attacks, which erase files from victim's...
The security challenge in 2016
It is a fact that cyber-attacks are growing more sophisticated. Protecting a company's information and data seems to be an arduous and complicated task, and finding trained personnel willing to combat continuing attacks gets more difficult all the time.However, the...