It’s time to take encryption seriously
Just like backup is something every business owner knows has to be done right but often isn't, data encryption is emerging as another essential requirement which is routinely ignored. And just like backup, many business owners find themselves shutting the stable door...
GIT offers new dvtel thermal imaging cameras
Graphic Image Technologies (GIT), specialists in remote CCTV and control room technologies, video compression and transmission, have announced the availability of the latest range of dvtel thermal imaging cameras, which incorporate analytics for enhanced intelligence....
Cyberoam expands iView portfolio
Cyberoam has announced the availability of its next-generation reporting series of iView appliances – iView NR, for Enterprises and MSSPs. The iView appliances offer centralised logging and reporting of Cyberoam network security appliances, along with other UTMs and...
Gartner names Check Point as UTM leader
Check Point Software Technologies, a leader in securing the Internet, recently announced that it is again positioned as a Leader in the 2014 Gartner Magic Quadrant for Unified Threat Management (UTM). This is the fourth consecutive year that Check Point has been named...
NetTraveler gets 10th anniversary makeover
In 2014 the actors behind global cyber-espionage campaign Operation NetTraveler celebrate 10 years of activity. Although the earliest samples appeared to have been compiled in 2005, certain indicators point to 2004 as the year when the malicious activity started. For...
An holistic approach to data protection
Complexity around data protection in the enterprise is increasing, especially with hybrid cloud implementation patterns. Kelly Brown, senior director: Regional and Channel Marketing for EMC Corporation’s Data Protection and Availability Division, says: “Successfully...
Sophos named a leader in UTM
Sophos has announced that it has once again been positioned in the Leaders quadrant of Gartner's 7 August, 2014 Magic Quadrant for Unified Threat Management. The quadrant is based on an assessment of a company’s ability to execute and completeness of vision. Sophos is...
Beware of the man in the middle
The motive for the vast majority of cybercrime is either to steal money or data. These attacks are sometimes small, targeting individuals, or sometimes massive, targeting large enterprises and stealing thousands of users’ details. In the majority of cases, attacks try...
Android app SandroRAT targets Polish banking
Europe is currently under attack by spammers trying to get control of Android devices. In Germany the distribution method is via SMS (text) messages, as you can read in this recent McAfee Labs post, while in Poland there is an on-going e-mail spam campaign...
Vivotek offers weatherproof surveillance
South Africans are no strangers to harsh weather conditions, with rough winds, hail downpours and thunderstorms that stun. With the new next-generation 1080p full HD speed dome network camera SD8364E from Vivotek, worries about the survival of your surveillance...
IoT is already here
With 2014 being dubbed as the year of the Internet of Things (IoT), there are major concerns regarding the security and privacy issues that consumers face now, and potential problems they could have in the future, says Trevor Coetzee, regional director South Africa...
Fighting the new style of cybercrime
The nature of the cybercrime landscape is shifting. No longer are the main threats related to the theft of personal details and financial information – like capturing logon credentials, identity theft and stealing credit card data. Today’s most destructive breaches...