Preventing watering hole malware attacks
A layered approach based on a combination of checks and balances, along with various key technologies, is the most comprehensive method of preventing so-called watering hole malware attacks. South African ICT managed cyber security provider and specialist Ukuvuma...
New assessment offering from DiData
Dimension Data has announced a new assessment offering that helps organisations assess the maturity of their security architecture, the underlying security safeguards that protect their human assets from cyber-attacks, and their processes and technologies. Sean Duffy,...
Protective monitoring key for security
Continuous end-point visibility has a massive role to play in mature security programs, says John Mc Loughlin, MD of J2 Software. Our customers with mature security programs have invested heavily in perimeter security, logging, and enhanced server / endpoint controls,...
Check Point ranks tops in firewall equipment
Check Point Software recently announced the company leads the worldwide market share for Firewall Equipment in Q4 2014 and FY 2014, according to research published by Gartner. Gartner’s Market Share Enterprise Network Equipment research states: * Check Point leads...
Voice biometrics reduces fraud
As the business realm continues to digitise, fraud, ID theft and information security concerns grow, and strong authentication becomes a critical issue. Voice biometrics is being adopted globally by companies, especially those with large contact centre operations,...
Small businesses at risk from cyber-threats
As governments around the world mull over cyber security measures and possible new legislation, many small and medium enterprises are pondering whether internet security is a real concern for their businesses, either because they are too small, or they don’t have...
How to escape from CoinVault
From today, victims of CoinVault ransomware have a chance to retrieve their data without paying the criminals, thanks to a repository of decryption keys and a decryption application made available online by Kaspersky Lab and the National High Tech Crime Unit (NHTCU)...
Mimecast secures e-mail messaging
Mimecast has announced a new service to help employees confidently send and receive sensitive or confidential information via e-mail. Mimecast Secure Messaging is designed to reduce the risk of data leaks and support compliance to data privacy and protection...
Debunking common security myths
Security, while a topic on every organisation’s lips, is also one that attracts a large number of myths. This is due in part to lack of information, erroneous assumptions and generalisations. As with all myths, they are filtered down from one person to another, mostly...
Protect the enterprise from cyber-attacks
High profile cyber-attacks on blue-chip global companies have sent shockwaves around the technology industry. It’s clear that threats in the digital era are morphing – becoming ever-more sophisticated and destructive. In the past couple of years, we have seen...
Keeping the connected generation safe online
Always-on connectivity has become part and parcel of today’s society, with more and more people relying heavily on email, social media and Web browsing, says Simeon Tassev, director and QSA at Galix. Children growing up in this era have unprecedented access to...
Kaspersky expands Endpoint Security features
Kaspersky Lab has announced the release of Kaspersky Endpoint Security for Business Service Pack 1 (SP1), its flagship product for business. In addition to offering superior security, the new edition of the flexible platform is easier to deploy and manage, and now...