Why standard data centre designs don’t work
Fast deployment time compared to traditional brick and mortar facilities is one of the biggest advantages of prefabricated data centres. Time can be saved in many areas of a project. However, when it comes to the actual initial design phase of a data centre, it simply...
Xerox combats counterfeiting with printed memory
To help businesses and government better secure products as they are distributed, Xerox has introduced two printed electronic labels (also known as “printed memory”) that can collect and store information about the authenticity and condition of products. Xerox Printed...
A click away from sharing company info on Facebook
With the proliferation of mobile devices in the workplace, it has become critical to not only manage your mobile assets, but also protect your company’s data. The purpose of enabling a mobile workforce is to increase employee productivity and improve customer service,...
CA leads in API management, says KuppingerCole
CA Technologies has been named the “overall leader” in API management in the recent Leadership Compass report issued by KuppingerCole, an analyst firm for identity-focused information security. CA’s API Management solutions were evaluated for the report, which...
Sophos recognised in three Magic Quadrant reports
Sophos has once again been positioned in the “Leaders” quadrant of Gartner’s 27 August “Magic Quadrant for Unified Threat Management.” The quadrant is based on an assessment on a company’s ability to execute and completeness of vision.
Changing the security culture
Ask any technical department what their major challenges are concerning cyber security, and it is almost guaranteed that many of them say their number one bugbear is changing the security culture of their organisation. Too often, says Jayson O’Reilly, director of...
IndigoCube, Akana partner on API management and security solutions
Akana has appointed IndigoCube as one of its preferred partners in South Africa. Akana helps businesses accelerate digital transformation by securely extending their reach across multiple channels – mobile, cloud and Internet of Things. Akana enables enterprises to...
DDoS extortion – a new threat to look out for
A hybrid security approach is a company's best chance of mitigating DDoS extortion attacks, says Gad Elkin, security sales director: EMEA at F5 Networks. It is a testament to the sustained evolution of the cybersecurity landscape that we are still regularly seeing the...
Managing identities across the organisation
Identity management (IDM) is essentially the management and administration of individual identities within a system, such as a business or a network. "Everyone has a digital presence of sorts," says Gerald Naidoo, CEO of Logical Consulting. "This could be social media...
How to protect yourself from online fraudsters
You receive an email or text message claiming you have won a cash prize, but you don't recall entering a competition. It says that to receive the money, you will need to share your banking details - what should you do? The answer is simple. Never provide personal...
User awareness is key in preventing cyber-attacks
Cyber-attacks have become a thriving and profitable industry for criminals, a fact that is evidenced by the increasing number of well publicised and high profile attacks over the past year. By Simeon Tassev, director of Galix. The majority of these attacks, which are...
BT ramps up cyber-attack protection
BT has announced the global launch of "BT Assure Ethical Hacking for Finance", a new security service designed to test the exposure of financial services organisations to cyber-attacks. The wealth of valuable and sensitive personal data held by financial...