VMware vSphere 6 boosts hybrid cloud
VMware has announced VMware vSphere 6, the newest edition of the industry-defining virtualisation solution for the hybrid cloud and foundation for the software-defined data centre. With more than 650 new features and innovations, VMware vSphere 6 will provide...
IAM trends for 2015
CA Technologies announced five key trends for security and identity and access management (IAM) that will impact organisations and security professionals in 2015 as they compete in the application economy. “The impact of data breaches in 2014, coupled with the demands...
Check Point retains top spot in rankings
Check Point Software Technologies has recently announced that the company holds the number one vendor position in worldwide combined Firewall and UTM appliance revenue for Q1 through Q3 in 2014, according to the latest IDC Worldwide Security Appliance Tracker research...
Cybercrime, hacking a worry for SMBs
Cybercrime costs the global economy $445-billion annually, and cyber espionage and stealing personal information is believed to have affected more than 800-million people during 2013. Although the perception of the risk of cybercrime is increasing (9% from 38% in 2011...
Smart homes easy prey for hackers
While the increasing use of home automation technology to create your version of a “smart home” may be trendy and seem practical, Richard Keymer, head of pre-sales at SecureData Africa, warns of the flip-side in that once an automation system is established and can be operated remotely online, then chances are it can be hacked.
Securing the new era of big data
In the digital age, information is the new currency. And in order to get information, enterprises are mining data – and lots of it – for the knowledge that it can yield, says Perry Hutton, Fortinet Africa regional director. On the scale of Internet commerce or social...
Steps to application-aware data protection
Many IT organisations have had the same data protection tools and practices for years, even decades, and see no need for that to change. However, Application Owners need to know that they’ll be able to recover their data at the application level when disaster strikes,...
Predicting DDoS attacks
Distributed denial of Service (DDoS) attacks are back in the news; it seems that barely a month goes by without media reports of a Web site or service being brought down by a DDoS attack. Sony’s PlayStation Network again became the victim of such an attack recently,...
IT security ‘fire drills’ key
IT security "fire drills", supported by executive management and the risk committee should be conducted regularly in organisations, in order to understand the appropriate course of action in advance of a security breach. So says Neil Campbell, group GM for Dimension...
Online security in the new school year
Those sunny summer holiday days are over and so your children, instead of spending their time playing outside or on the beaches, will be back in front of their computers, tablets and smartphones busily exploring online encyclopaedias and dictionaries to help them...
Risky mobile behaviour endangers companies
The bad news for companies is that employees are increasingly taking part in risky mobile behaviour, with nearly 90% accessing confidential information on mobile devices, despite less than a quarter of them receiving mobile security training, said Derick Roberts, CEO...
Thermal imaging cameras for surveillance
Surveillance is an essential component of many security systems today, as it acts both as a deterrent and provides evidence to assist with identifying and prosecuting offenders, says Leon Cahill, security product manager at Jasco Enterprise. However, in many instances...