Securing the new era of big data
In the digital age, information is the new currency. And in order to get information, enterprises are mining data – and lots of it – for the knowledge that it can yield, says Perry Hutton, Fortinet Africa regional director. On the scale of Internet commerce or social...
Steps to application-aware data protection
Many IT organisations have had the same data protection tools and practices for years, even decades, and see no need for that to change. However, Application Owners need to know that they’ll be able to recover their data at the application level when disaster strikes,...
Predicting DDoS attacks
Distributed denial of Service (DDoS) attacks are back in the news; it seems that barely a month goes by without media reports of a Web site or service being brought down by a DDoS attack. Sony’s PlayStation Network again became the victim of such an attack recently,...
IT security ‘fire drills’ key
IT security "fire drills", supported by executive management and the risk committee should be conducted regularly in organisations, in order to understand the appropriate course of action in advance of a security breach. So says Neil Campbell, group GM for Dimension...
Online security in the new school year
Those sunny summer holiday days are over and so your children, instead of spending their time playing outside or on the beaches, will be back in front of their computers, tablets and smartphones busily exploring online encyclopaedias and dictionaries to help them...
Risky mobile behaviour endangers companies
The bad news for companies is that employees are increasingly taking part in risky mobile behaviour, with nearly 90% accessing confidential information on mobile devices, despite less than a quarter of them receiving mobile security training, said Derick Roberts, CEO...
Thermal imaging cameras for surveillance
Surveillance is an essential component of many security systems today, as it acts both as a deterrent and provides evidence to assist with identifying and prosecuting offenders, says Leon Cahill, security product manager at Jasco Enterprise. However, in many instances...
Video surveillance trends for 2015
With the Internet of Things (IoT) continuing to be a hot topic throughout 2014 and across all industries - whether it’s about smart cars or intelligent appliances such as connected refrigerators - more consumers and businesses are now aware of the advantages of being...
Logical access is key for privacy management
Information about individuals has become readily available due to multiple transactions and the various online accounts people have, says Stan Khan, MD at Muvoni Biometrics and Smartcard Solutions (MBSS). With the advances in technology comes greater access to the...
Kaspersky solution lauded by MRG Effitas
Based on the results of efficacy assessments conducted in Q3 2014, MRG Effitas has certified Kaspersky Internet Security as a solution that provides effective protection for online transactions. In particular, the test for protection against man-in-the-middle attacks (interfering with the data transmission protocol in order to distort data) was removed.
Electronic signatures aid mining security
Mining holds a unique position in South Africa as one of the largest employment sectors and a major contributor to the local economy. It is also one of the more dangerous industries, and as such is heavily regulated, says Avi Rose, country manager: South Africa at...
Kaspersky launches online cyberthreat radar
As complex operations become an increasingly frequent feature of contemporary cybercrime, Kaspersky Lab is launching an online service that brings together all the information it holds on the most sophisticated cyber campaigns. The interactive targeted cyber-attacks...