SA companies open up to handing over email security
Managed IT security vendor Securicom continues to enjoy impressive year-on-year growth in the interest and adoption of its email security and content management service as evolving email-borne security threats and the increasing complexity of security technologies...
Atio offers voice biometrics via OneVault partnership
Atio has partnered with voice biometric authentication service provider OneVault to offer voice biometric solutions to its customers. According to Atio’s CEO, Chris Van der Sande: “ATIO has been focused on introducing innovative solutions into our overall solution...
No silver bullet for security
The security landscape is a complex one, and several layers of defence at multiple points in the organisation are needed to successfully combat today’s sophisticated threats. Unfortunately, for too many businesses, the idea of a ‘quick fix’ is tempting, and they learn...
Weak passwords threaten the enterprise
Research reveals time and again that weak login credentials, including passwords, remain among the top causes of data breaches around the world. Despite this, individuals continue to choose weak and insecure passwords to protect their most sensitive data. Simon...
Security tips from Kaspersky Lab
Security experts from Kaspersky Labs share the security measures they use to protect their own communications via e-mail, instant messaging tools, smartphones, and while browsing over computer networks and interacting with the physical world.
Designing a security policy
Businesses today face myriad complex threats coming at them from every angle. From hackers and hacktivists, to sophisticated cybercriminal gangs and nation-state funded advanced attacks, these threats can be catastrophic to the business. Add to this the growing...
Celebrating a decade in biometrics
Ideco recently celebrated a decade in the ever-evolving biometrics arena by hosting its annual Ideco & Partners golf day to commemorate this prestigious milestone. Over the years, Ideco has distributed in excess of 100 000 fingerprint readers which have been...
Oracle introduces recovery appliance
Oracle’s Zero Data Loss Recovery Appliance (Recovery Appliance) is the first appliance ever to deliver zero data loss protection for critical Oracle Databases. When using today’s solutions to restore a database, businesses typically lose all data generated since the...
Cyberoam offers online learning platform
Cyberoam has launched the online virtual learning platform for Cyberoam’s well-known network-security certification program– Cyberoam Certified Network Security Professional, CCNSP. The training is available 24/7, can be accessed from a connected device anywhere...
Access control matters
The level of innovation, research and development that defines access control in business reflects how seriously decision makers view this facet of operations management. The ability to compete in any industry or sector today is heavily dependent on the availability...
BT expands Assure portfolio
BT has announced the latest addition to its BT Assure portfolio: Assure Threat Defence. BT has combined cutting edge event monitoring technology and professional services to create Assure Threat Defence which helps customers and security analysts better identify and...
Preparing for a cyber-attack
Cyber-attacks are a threat to businesses of all types and of all sizes, from the giant enterprises to the smaller SMEs. A popular maxim is that there are two types of companies - those who have been breached, and those who have been breached but don’t know it....