Fighting DDoS attacks
Distributed denial of service, or DDoS, attacks can be hugely damaging to businesses that rely on their online presence for sales and new business - and DDoS attacks are undoubtedly on the rise. According to DDoS mitigation provider, Prolexic, the second quarter of...
14 security predictions for 2014
Check Point SA’s sales manager, Doros Hadjizenonos, looks back at how accurate security forecasts for 2013 proved to be, and gives his predictions for the year ahead. With the end of 2013 approaching, and in light of the signing into law of the recent Protection of...
2014 security predictions from Trend Micro
Trend Micro Incorporated has released its annual security predictions report, Blurring Boundaries: Trend Micro Security Predictions for 2014 and Beyond. The outlook cites that one major data breach will occur every month next year, and advanced mobile banking and...
ISPs key in fighting child abuse
With Google and Microsoft’s much-publicised efforts to clamp down on access to child abuse material from being available through a simple search online, the spotlight is on this crime worldwide. While the Internet search engines have introduced new algorithms that...
Cyberoam offers infrastructure security
Cyberoam, the leading global provider of network security appliances, has announced the availability of security for Industrial Control Systems (ICS) on its UTM and NGFW network security appliances. Until recently, organisations maintained their critical...
TruTeq introduces analogue camera interface
Truteq Devices, one of the leading wireless specialists in South Africa, is continuing with the introduction of new products for its growing range of wireless products and solutions, this time introducing the analogue camera interface. According to Derick Roberts, CEO...
eScan launches cloud security for businesses
eScan, one of the leading Anti-Virus and Content Security Solutions provider has launched its latest version of business security solutions – eScan 14 SMB Editions with Cloud Security, eScan 14 Corporate Edition with Cloud Security and eScan 14 Enterprise Edition with...
Panda protects smartphones, tablets
Panda Security has announced general availability on Google Play of version 1.1 of Panda Mobile Security, its solution for protecting mobile devices running Android. Among other features, this new release includes geolocation and anti-theft protection, allowing users...
Security in the network environment
Threats to network security are escalating dramatically. Technology advancements in social media, mobile devices, WiFi and cloud services are increasing a company’s vulnerability to attacks. Cyber risks and cyber-threats are a major concern for large revenue...
Fortinet introduces new appliance
Fortinet has announced the FortiSandbox-3000D, an advanced threat prevention appliance that provides enterprises with a powerful tool to help combat Advanced Persistent Threats (APTs). The new offering combines a unique dual-level sandbox, dynamic threat intelligence,...
Comprehensive protection for all devices
A flood of new malicious code is drowning the Internet, with hundreds of thousands of new malware samples discovered on a daily basis. Moreover, the price of not having adequate protection in place has risen exponentially. Cyber crooks steal online banking credentials...
Don’t be a hostage to ransomware
Latest-generation ransomware can permanently encrypt business files, unless you pay to free them. Doros Hadjizenonos, Sales manager at Check Point South Africa takes a look at how ransomware is on the rise, and how firms can defend their data against being taken...