Getting the board’s buy-in for information security
Security breaches, although unexpected, are happening all the time. Barely a day goes by without a story in the news about a fresh victim, be it a bank, retailer or publishing house. In addition, surprisingly, most company's boards are not included in the decision...
Ensuring data security in an insecure world
"Copier Secrets", one of the topics covered on Carte Blanche on Sunday, 30 August, highlighted how copiers retain sensitive data on their built-in hard drives and the security risks associated with this due to the potential for malicious retrieval. The programme...
How to keep your children safe online
Very few parents use parental controls on Internet-enabled devices bought for their children, leaving youngsters potentially exposed to online threats. Most parents feel it is suitable for children to use the internet either somewhat supervised or totally...
Dermalog wins African biometrics prize
The consulting company Frost & Sullivan has awarded Germany's largest biometrics manufacturer Dermalog and its customised solutions and products for Africa with the "2015 African Biometrics Company of the Year Award". Dermalog is particularly successful with a...
Trend Micro expands alliance with VMware
As organisations seek a comprehensive approach to transition seamlessly and securely to the cloud, Trend Micro International has announced a global agreement to expand its strategic alliance with VMware. This partnership helps customers to accelerate and maximise...
Developing a mature security model
Being confident that your security measures and solutions are effective is crucial for today's enterprises. As cyber-attacks grow exponentially, in both frequency and sophistication, businesses of every type and size are battling to stay ahead of the threats. "Picking...
Avoid security leaks in your printers and copiers
A Carte Blanche segment on Sunday, 30 August, highlighted the need to secure documents on copiers, printers and multifunction printers (MFP) because the devices contain hard disk drives (HDD) that store document data that villains could later reproduce. And they...
Kaspersky Lab launches a solution for Mac-savvy businesses
Kaspersky Lab has launched a new version of Kaspersky Endpoint Security for Mac to address modern heterogeneous environment cybersecurity trends and threats. The solution will be available as part of the Kaspersky Endpoint Security for Business suite, which can be...
IndigoCube offers web application security assessment
IndigoCube has announced the availability of its Web Application Security Assessment (WASA) service, designed to identify specific vulnerabilities in websites and web-based applications, and then to provide pragmatic remediation actions to correct and avoid future...
ESET upgrades parental control
ESET has launched a Beta version of its new ESET Parental Control for Android app. As a thank you to all Beta testers, ESET is offering free access to the app’s security features such as Web Guard or Time Management for six months at no cost. According to the Ofcom...
Check Point offers Mobile Threat Prevention
Check Point Software Technologies, the largest pure-play security vendor globally, recently announced Check Point Mobile Threat Prevention, a new mobile security solution that allows enterprises to battle today’s mobile threat environment. Check Point Mobile Threat...
Securing the mobile organisation
There are several issues security professionals need to bear in mind when designing their mobile security policies. Businesses of all types and sizes are using smartphones and tablets to access sensitive company data, and as such, need to be protected. Probably the...