Protecting a big data environment
Prevention is always better than cure when it comes to information security, particularly when dealing with today’s big data environments that see a flood of data drowning the enterprise on a daily basis. Gerald Naidoo, CEO of Logikal Consulting, says it’s not only...
DCC enhances security portfolio
Distributor Drive Control Corporation (DCC) has announced the addition of globally acclaimed FireEye Cyber Security and Malware Protection solutions and services to its comprehensive portfolio of security tools and software. FireEye is the world leader in addressing...
Kaspersky wins PC Security Labs award
Kaspersky Internet Security for Android took first place in a test of Android security products conducted by PC Security Labs, an independent Chinese company. According to the test results published this November, Kaspersky Lab’s product successfully countered 99.959%...
Camargue launches cybercrime division
As cyber security tools have become more advanced and effective, so have hackers’ efforts - so much so that cybercrime has now surpassed illegal drug trafficking as a criminal money maker and is reportedly costing SA in excess of R5,8-billion every year. According to...
Eight security trends for 2015
The networking and security industries are evolving rapidly. Here are Fortinet's views on the most important developments and technologies to look out for in 2015, says Perry Hutton, Fortinet Africa regional director. Security breaches are harder to stop Security...
UWC happy with FortiGate solution
The University of the Western Cape (UWC) reports that its Fortinet security solutions are proving so efficient that no security incidents have occurred to date this year. Elroy October, Systems Administrator at UWC’s central IT department, joined the central IT...
Social media in digital forensics
Social media has fundamentally changed the way information is shared and accessed. As a result, these channels are playing an increasingly important role in cyber forensic investigations. “Social media has become an extension of our everyday lives and a primary means...
Firewalls are the cornerstone of security
Despite claims of its demise, the firewall is still the foundation stone of security deployments. Doros Hadjizenonos, Check Point South Africa sales manager, looks at how it has adapted to combat three decades of threats. Was your business online 20 years ago?...
SSL encrypted traffic management key
According to Blue Coat, NSS research has uncovered that 25% to 35% of network traffic is encrypted within most modern organisations and according to Gartner by 2017 over half of the network attacks targeting enterprises will use encrypted traffic to evade controls....
F5 Networks announces Silverline
F5 Networks has announced new hybrid service capabilities to help organisations scale IT resources across dynamic cloud and data centre deployments. Under the company’s new Silverline banner, F5 will offer extended security, optimisation and availability services from...
Dell improves security portfolio
Dell recently announced product integrations and innovations within its security portfolio that provide organisations with a high level of protection, and turn security into a business enabler.
Keyloggers steal millions of credentials
Malware and threats have evolved to previously unimagined levels. Gone are the days where pimply geeks in basements wrote proof-of-concept malware to show off – today’s threat authors mean business, whether that is stealing millions of rands, proprietary company data...