Why passwords don’t work
The IT security industry has been warning about the fallibility of passwords for years, yet the situation hasn’t changed. Millions of people still depend on the most common password - ‘password’, simple number sequences like ‘12345’ or the name of their dog to secure...
RSA improves Security Analytics offering
RSA has announced new capabilities have been added to RSA Security Analytics that are designed to help organisations extend protection of their infrastructure into the cloud.RSA Security Analytics is engineered to give organisations the necessary context to help...
CA Technologies wins SC award
CA Southern Africa has revealed that CA Technologies has received SC Magazine’s2015 Reader Trust Award for Best Identity Management Solution. A panel representing the readers of SC Magazine selected CA Identity Manager as the best-in-class security product in the...
Insiders are the biggest security threat
Businesses are under siege. While security has been a constant concern for companies since they started using the Internet to connect to the outside world, today’s proliferation of connected devices, distributed networks and increasingly militant cybercriminals has...
EMC boosts performance, efficiency
EMC Corporation has announced major new platforms and enhancements that span the portfolio of EMC XtremIO, EMC VMAX3, VCE, EMC VNX, EMC Data Domain and EMC Data Protection Suite products. The world is going through unprecedented transformation. By 2020, more than...
Kaspersky updates Security Scan
Kaspersky Lab presents a new version of Kaspersky Security Scan, a free solution for Windows-based computers. Now the scanner not only detects malicious software and operating system settings that make the device vulnerable, but also offers users advice on resolving any issues identified. Kaspersky Security Scan enables users to quickly scan their computers for cyber-threats. The scanner works even if there is another security solution installed on the computer.
Save on your home security bills
Everyone knows that South Africans ensconce themselves behind huge walls and electric fences and deploy alarm systems installed at huge cost and backed by armed response companies. With the county’s astronomical crime rate this is understandable. Says Derick Roberts,...
2015: the year of a data dystopia
With news of the 2015 Oscar winners still ringing in our ears, there is something about this time of year that makes watching a good film particularly satisfying, says Brian Mitchell, senior product marketing manager at CommVault. However, even amidst so many great...
Rethinking security to beat future threats
The transformation of enterprise IT can seem like one of the biggest challenges for security professionals as there is a whole new skill set required today to protect data, says Brendan Mc Aravey, country manager, Citrix South Africa. It’s no longer about providing...
The dangers of a connected world
While the Internet of Things (IoT) is a fairly new concept, it has arrived. Over and above PCs, smartphones and tablets, Internet connected devices such as speakers, baby monitors, fridges, cars, thermostats, fans, lights, and locks can connect to the Internet, with...
Check Point launches cyberthreat map
Check Point recently launched the ThreatCloud World Cyber Threat Map, which visualises how and where cyber-attacks are taking place worldwide in realtime. The Map is powered by Check Point’s ThreatCloud intelligence, the largest collaborative network to fight...
Kaspersky analyses Q1 cyberthreats
The first quarter of 2015 saw the revelation of the most sophisticated advanced persistent cyberespionage threat to date: Equation. The Death Star of the Malware Galaxy and linked to the infernal Stuxnet and Flame super-threats, its first known sample dates back to...