Rethinking security to beat future threats
The transformation of enterprise IT can seem like one of the biggest challenges for security professionals as there is a whole new skill set required today to protect data, says Brendan Mc Aravey, country manager, Citrix South Africa. It’s no longer about providing...
The dangers of a connected world
While the Internet of Things (IoT) is a fairly new concept, it has arrived. Over and above PCs, smartphones and tablets, Internet connected devices such as speakers, baby monitors, fridges, cars, thermostats, fans, lights, and locks can connect to the Internet, with...
Check Point launches cyberthreat map
Check Point recently launched the ThreatCloud World Cyber Threat Map, which visualises how and where cyber-attacks are taking place worldwide in realtime. The Map is powered by Check Point’s ThreatCloud intelligence, the largest collaborative network to fight...
Kaspersky analyses Q1 cyberthreats
The first quarter of 2015 saw the revelation of the most sophisticated advanced persistent cyberespionage threat to date: Equation. The Death Star of the Malware Galaxy and linked to the infernal Stuxnet and Flame super-threats, its first known sample dates back to...
South Africa’s vehicle crime rates climb
Crime rates in South Africa are expected to continue their upward climb as economic and social conditions deteriorate - a trend that is already being evidenced in the sharp climb in truck and car hijackings. As economic growth contracts, unemployment figures grow and...
Make security part of your company’s DNA
The world is a new place – social networks are no longer fads for youngsters but have evolved into valuable business tools for the modern business. They include rich applications, real time interactions and all the user generated content you can consume. Local IT...
The vulnerability of things
There is a disconnect between business and the IT department, as most executives on the ‘business’ side don’t fully grasp the very real risks posed by today’s advanced cyber threats. Coupled with this, the technical department too often doesn’t have the influence...
New SonicWALL TZ Series firewalls released
Dell has announced the release of the new SonicWALL TZ Series firewalls. Featuring a dramatic increase in network performance to support faster Internet speeds, the ability to analyse encrypted SSL traffic, and an integrated wireless controller, the new solutions deliver enterprise-class security at a price point that is attractive for small businesses and large, multi-site distributed organisations.
Betting the farm on untested tech
While a plethora of new payment solutions are coming to market, businesses should be cautious about moving to new solutions just for the sake of it, Jonas Thulin, security consultant at Fortinet. Customers are driving a great deal of change in how transactions are...
Kaspersky to protect Allied Telesis
Allied Telesis, a global provider of secure IP/Ethernet switching solutions and an industry leader in the deployment of IP Triple Play networks, announced that it has selected Kaspersky Lab to provide anti-malware and anti-virus engines for its new series of...
How to fight and avoid ransomware
Ransomware is malicious software that cyber criminals use to hold a user’s computer or computer files for ransom, demanding payment in order for the user to get the files back. Sadly, ransomware is becoming an increasingly popular way for malware authors to extort...
A new approach to preventing data loss
With POPI on the horizon, businesses are looking to technology to prevent and control the unauthorised use of information, be it accidental or deliberate. A solid chain of security links is vital in preventing any breaches, and data loss prevention (DLP) is one of the...