Sophos Cloud now with advanced Web security
Sophos has announced the availability of Sophos Cloud Web Gateway, a cloud-based secure web gateway that delivers advanced protection for users, devices and data across multiple operating systems, regardless of their location. The addition of secure Web gateway to...
Naivety no excuse for poor app security
The security war will never be won until all stakeholders – developers, service providers, consumers and everyone else in the value chain – start collaborating, sharing information and having open discussions about the threat landscape. This common sentiment emerged...
The dangers of identity theft
Scores of South Africans woke up to a disturbing reality this week when the British High Commission contacted them to say that their UK Visa Applications together with all supporting documentation were stolen, when the courier van that was transporting these documents...
OS migration security tips
Major events in the IT landscape, such as the availability of a new operating system (OS), cannot go by unnoticed, because they affect businesses of all shapes and sizes. Many will ask themselves “should we migrate to a new version and if yes - when?” Anyone who has...
Gemalto enables crypto in the cloud
Building on successful deployments with several leading cloud infrastructure providers, Gemalto has announced the availability of SafeNet Luna SA 6, the first HSM (hardware security module) purpose-built for service providers to offer on-demand crypto processing, key...
Three steps to smart mobile security
Mobile devices and apps are how work gets done these days. Employees aren’t tied to their desks, work doesn’t always mean sitting down from 9 to 5 and meetings can take place anywhere from a coffee shop to the side-lines of a soccer game, says Brendan Mc Aravey,...
Balancing usability and security
There are several facts that any organisation wishing to secure itself against hackers needs to face. Firstly, if a threat actor really wants to access your system he will. There are too many layers - called the attack surface - each containing their own...
The anatomy of an APT
With the rise in advanced persistent threats (APTs) we’ve seen over the past few years, has risen a myth that these threats are all about malware. This is not the case. A huge percentage of successful APT attacks have used legitimate log-in credentials to accomplish...
Trend Micro Security works with Windows 10
Trend Micro continues to focus on making everyone’s digital lives easier and safer. To offer consumers optimal protection, the global leader in security software today announced Trend Micro Security 10 – a security and privacy solution fully compatible with Microsoft Windows 10, which was launched last week.
Unpacking security myths
One of the hurdles facing businesses who are attempting to secure themselves, and minimise cyber security risks, is a number of basic security myths that cause them to set inappropriate goals and allocate their resources ineffectively. Understanding what the real...
Protecting your children online
Hundreds of thousands of children surf the Web every day. While the Net can be a good influence, and assist with learning and education, it also poses enormous dangers. It is because of these threats and risks to children, that parents need to step in and help protect...
Trend Micro solution on Azure Marketplace
As cloud infrastructure adoption continues to accelerate, Trend Micro has announced the availability of its cloud and data centre platform, Trend Micro Deep Security, on the Azure Marketplace, an online store providing applications and services for use on Microsoft...