Data centre security grows online democracy
Another day, another headline about government hacking of sensitive data. This time it’s allegations that Chinese authorities hacked the Office of Personnel Management network, accessing information belonging to millions of US federal employees in what has to be seen...
Fortinet expands NGFW range
Fortinet has announced the launch of the FortiGate 400D and the FortiGate 900D next-generation firewalls (NGFWs). These new appliances further bolster Fortinet’s broad portfolio of integrated security solutions while delivering five times greater NGFW performance than...
Kaspersky Lab, Blizzard offer gamer special
This August, gamers can take advantage of a special offer from Kaspersky Lab and Blizzard Entertainment. Anyone who purchases Kaspersky Internet Security – multi-device 2015 or Kaspersky Total Security – multi-device in retail stores or online will get a special free...
The rise of the digital vault
You only have to read these names to know that e-mail and Internet security are under threat: Edward Snowden, Ashley Madison and Sony. Thanks to advances in technology, many of the digital tools used to communicate are no longer secure and this can have far reaching...
Mobile as a password alternative
Our mobile numbers are unique. And our phones are always at hand. So could mobile provide a secure alternative to the password? Jean-Francois Ouillet, vice-president of mobile security at Gemalto, outlines the potential of mobile ID. How many passwords do you have?...
Sophos Cloud now with advanced Web security
Sophos has announced the availability of Sophos Cloud Web Gateway, a cloud-based secure web gateway that delivers advanced protection for users, devices and data across multiple operating systems, regardless of their location. The addition of secure Web gateway to...
Naivety no excuse for poor app security
The security war will never be won until all stakeholders – developers, service providers, consumers and everyone else in the value chain – start collaborating, sharing information and having open discussions about the threat landscape. This common sentiment emerged...
The dangers of identity theft
Scores of South Africans woke up to a disturbing reality this week when the British High Commission contacted them to say that their UK Visa Applications together with all supporting documentation were stolen, when the courier van that was transporting these documents...
OS migration security tips
Major events in the IT landscape, such as the availability of a new operating system (OS), cannot go by unnoticed, because they affect businesses of all shapes and sizes. Many will ask themselves “should we migrate to a new version and if yes - when?” Anyone who has...
Gemalto enables crypto in the cloud
Building on successful deployments with several leading cloud infrastructure providers, Gemalto has announced the availability of SafeNet Luna SA 6, the first HSM (hardware security module) purpose-built for service providers to offer on-demand crypto processing, key...
Three steps to smart mobile security
Mobile devices and apps are how work gets done these days. Employees aren’t tied to their desks, work doesn’t always mean sitting down from 9 to 5 and meetings can take place anywhere from a coffee shop to the side-lines of a soccer game, says Brendan Mc Aravey,...
Balancing usability and security
There are several facts that any organisation wishing to secure itself against hackers needs to face. Firstly, if a threat actor really wants to access your system he will. There are too many layers - called the attack surface - each containing their own...