Video surveillance trends for 2015
With the Internet of Things (IoT) continuing to be a hot topic throughout 2014 and across all industries - whether it’s about smart cars or intelligent appliances such as connected refrigerators - more consumers and businesses are now aware of the advantages of being...
Logical access is key for privacy management
Information about individuals has become readily available due to multiple transactions and the various online accounts people have, says Stan Khan, MD at Muvoni Biometrics and Smartcard Solutions (MBSS). With the advances in technology comes greater access to the...
Kaspersky solution lauded by MRG Effitas
Based on the results of efficacy assessments conducted in Q3 2014, MRG Effitas has certified Kaspersky Internet Security as a solution that provides effective protection for online transactions. In particular, the test for protection against man-in-the-middle attacks (interfering with the data transmission protocol in order to distort data) was removed.
Electronic signatures aid mining security
Mining holds a unique position in South Africa as one of the largest employment sectors and a major contributor to the local economy. It is also one of the more dangerous industries, and as such is heavily regulated, says Avi Rose, country manager: South Africa at...
Kaspersky launches online cyberthreat radar
As complex operations become an increasingly frequent feature of contemporary cybercrime, Kaspersky Lab is launching an online service that brings together all the information it holds on the most sophisticated cyber campaigns. The interactive targeted cyber-attacks...
Thermal imaging cameras mitigate poaching
Effective monitoring is key in the fight against rhino poaching. Using thermal imaging cameras with advanced detection capability can offer a more proactive solution to stopping poachers. Technology not only helps to protect the lives of the rangers, it can also mean the difference between pre-empting the death of a rhino, or hunting for the killers after the fact, when it is already too late.
Effective security is proactive, agile, multi-layered
Rapidly evolving cyber threats and attack modes mean that every organisation should assume it has already been breached. The question now is – what to do next? Not only have cyber criminals become more sophisticated, but enterprise exposure to risk is growing fast,...
Gemalto launches Sealys Secure Surface
Gemalto has launched Sealys Secure Surface, a new family of cost-effective security features for polycarbonate identity documents that strengthens protection against fraud by combining three different effects: light reflection, movement and tactile elements. Sealys...
Kaspersky Lab counts 2014 cyberthreats
In 2014 Kaspersky Lab experts saw considerable growth in the number of malicious attacks on user computers and mobile devices, further development of financial malware and a change in the vectors of web attacks. Based on the company’s statistics, 2014 in figures looks...
Blue Coat uses Kaspersky technologies
Kaspersky Lab announced that Blue Coat’s Content Analysis System S500 includes Kaspersky Lab’s industry-leading whitelisting technology and award-winning anti-malware engine. Together, Kaspersky Lab’s whitelisting technology and anti-malware engine are designed to...
Security predictions for 2015
2014 has been particularly busy for IT security professionals. Many of the threats that we predicted at the start of the year duly emerged, while other significant issues caught the entire sector by surprise. We anticipated, and saw, increases in social engineering...
POPI and BYOD
Mobile security that complies with the Protection of Personal Information Act (POPI) is going to be particularly challenging for organisations that have embraced BYOD. Companies need to recognise the risk within their firms, as the majority of employees use their...