Check Point super-sizes appliance for SMEs
Check Point Software Technologies has unveiled the Check Point 700 Series appliances, designed to enable small and medium-sized businesses to innovate and grow without the worry of today's most sophisticated cyber criminals and zero-day threats. The new purpose-built...
Protect your business from cybercrime
Obtaining sensitive data is the primary objective for cybercriminals when targeting businesses. Sensitive data can vary depending on the organisation but examples include intellectual property, source code, trade secrets, customer and employee personal identifiable...
Will the Fourth Industrial Revolution be safe?
The convergence of the digital and physical worlds is more than a MasterCard rally cry, writes Ajay Bhalla, president: enterprise security solutions at MasterCard. It is in fact a fundamental shift that's driving the Fourth Industrial Revolution or Industry 4.0, where...
Easy-to-use enterprise mobility management from Sophos
Sophos has announced the availability of Sophos Mobile Control 6.0, which now includes Sophos Secure Email, a container solution that isolates and secures business data from personal information on devices. Sophos Mobile Control 6.0 also enhances data protection...
Cloud-based security best for multiple remote threats
Cloud-based security solutions are the more effective and most immediate way for companies to deal with security threats arising from the multiple internet access points created by employees on their devices from remote places. This is according to Richard Broeke, an...
Security, security, security
Jason Dover, director: product line management at KEMP Technologies explores the security imperative for today's complex networks. It is every CISO's worst nightmare - the phone call in the middle of the night to say that a security breach has occurred. For the rest...
DDoS protection needs a multi-faceted approach
With distributed denial of service (DDoS) attacks becoming more complex and sophisticated, so must any defensive strategy that attempts to fully protect a financial institution. This is according to Arbor Networks, the security division of Netscout. While traditional...
Fighting the scourge of blog spam
Back in the late 90s, a new type of journalism emerged, alongside the advent of free publishing platforms. At the time, no one knew blogging would become one of the most important platforms of expression, and the sharing of news and ideas, forever altering the face of...
Battling the enemy within
The world moves swiftly; the IT security world even more so. Just a couple of years ago, securing the enterprise would basically consist of protecting an organization from external intruders. Today, the battle has changed ground. By Michael Xie, founder, president and...
IndigoCube, Gemalto join forces to tackle data security
Data security solutions supplier Gemalto has appointed IndigoCube as a partner in the Southern Africa region. The two companies will kick off their collaboration with a joint Data Security Summit on 3 March at the Radisson Blue Gautrain Hotel in Johannesburg. "Data...
NEC adds to security portfolio
NEC has announced the official launch of a Cyber Security Factory in Singapore as the latest addition to its global portfolio of security operation centres. In 2014, NEC established its first Cyber Security Factory in Japan as a specialized unit dedicated to...
Kaspersky uncovers Russian spear-phishing
Kaspersky Lab's Global Research and Analysis Team has discovered signs of previously unknown attacks by the Russian-speaking BlackEnergy APT group. A spear-phishing document found by the company's experts mentions the far-right Ukrainian nationalist political party...