New book tackles mobile application security
The Mobile Application Hacker's Handbook is available to buy in the UK. It is a comprehensive and practical guide to securing mobile applications. The book, co-authored by security professionals, including Tyrone Erasmus, head of the Mobile Practice at MWR...
Allocating budget for DDoS protection
In an environment rife with rapidly evolving malware, targeted attacks on enterprise and the escalating mobile security problem, defending against distributed denial of service (DDoS) attacks might not take top priority on the information security manager’s checklist,...
Dell announces new endpoint security suite
Dell has announced a new endpoint security suite that enables businesses of all sizes to secure their workforce, protect data and meet compliance requirements. The Dell Data Protection | Endpoint Security Suite (DDP | ESS) delivers threat protection, authentication...
Sophos expands protection portfolio
Sophos has announced new versions of key products that deliver on the company’s vision of Next-Generation Enduser Protection. Aimed at delivering protection against malware and advanced threats, Next-Generation Enduser Protection integrates Sophos’ endpoint, mobile and encryption technologies.
Car manufacturers behind in security
With consumer demand at an all-time high, and with software developers being pushed to release new connected car software with the most up-to-date features, it seems that security is taking a back seat, says Martin Walshaw, senior engineer at F5 Networks. German...
Phishing, exploits, botnets affect business
More and more often companies are the targets of cybercriminals regardless of their size, says Carey van Vlaanderen, CEO of ESET Southern Africa. The attacks usually end with sensitive information being stolen, leaving the business in a very difficult situation. In...
Check Point introduces Threat Extraction
Check Point Software Technologies, the largest pure-play security vendor globally, has introduced Check Point Threat Extraction, a new security approach that proactively ensures documents are delivered to a network with zero malware in zero seconds. Attacks are...
Managed IT security services key
More South African companies are beginning to favour managed IT security services. Where companies once considered it risky to hand over the function to a third party, keeping security in-house is proving to be riskier. Why? The average business simply doesn’t have...
Security is everyone’s business
Security is no longer the ambit of the IT department alone. As more South African companies conduct business online, and as more people and things connect to the Internet, security becomes everyone’s business – from the CEO to the newest or most junior employee, says...
BT enhances security portfolio
BT has announced that it is integrating technology from Darktrace, one of the world’s fastest growing cyber threat defence companies, to deliver next-generation cyber threat detection and intelligence services to the global market. Darktrace’s Enterprise Immune System...
Technology can mitigate mobile banking fraud
Financial services companies should look for solutions that allow them to control the entire mobile transaction lifecycle if they want to beat fraudsters who exploit mobile security gaps to defraud bank account holders. That's the word from Zane Renou, chief...
MobileData now PCI DSS v3.0 certified
MobileData, a global technology solutions provider focused on payment facilitation and prepaid electronic value distribution, has acquired PCI DSS v3.0 certification and strengthened its enterprise service platform TradeSwitch with payment feature. PCI DSS or Payment...