PRISM break: US cloud customers defect
In June, thanks to one of its now former and very famous employees blowing the whistle, the news broke that America’s National Security Agency (NSA) was using a programme, code-named PRISM, to spy on e-mails, Internet phone calls, file transfers, photos, videos and...
Video surveillance creates opportunities
Video surveillance is increasingly gaining the attention of businesses as a means to reduce crime such as theft and even increase productivity. In earlier days, these companies would identify a suitable security reseller to provide them with a solution that runs on...
Security by obscurity doesn’t exist
Today, more than ever, good network security is absolutely essential for every business (indeed, every computer) that’s connected to the Internet as the threats are far more subtle than having a hacker or virus crash your computers. According to Derek Hershaw, CEO of...
Exposing security weaknesses
Experts from Kaspersky Lab and Outpost24 recently carried out a security audit at a number of European organisations and studied the prevalence of un-patched vulnerabilities globally to get a better understanding of the IT (in) security landscape. Their joint report...
Tax season: prime time for APTs
The global scope of advanced persistent threats (APTs) is greater than most people realise. Because these attacks are typically launched through various channels over a period of time, they can be difficult to identify and can remain unperceived for years, says Jonas...
Security best practices for local SMB
Cybercrime in South Africa is increasing at epidemic proportions and small to medium businesses have turned into key targets for cybercriminals. Small businesses rarely recover from cyber-attacks, but there are some very simple steps you can take to protect your...
Outplay, outwit, outsmart with PCI DCC 3.0
Traditional PCI DSS (Payment Card Industry Security Data Standards), as outlined by the PCI Security Council, were traditionally enforced to ensure that merchants' perimeter payment-card security initiatives were in line with the minimum legislation, but not much...
Forrester names CA Technologies a leader
Forrester analysts evaluated nine identity and access management (IAM) suites against 16 criteria to help security and risk professionals select the right solution for their enterprise, business-to-business and consumer-facing IAM deployments. The CA Technologies...
Cyberoam announces new NGFW appliances
Cyberoam, the leading global provider of network security appliances, has unveiled next-generation firewalls (NGFW) in its NG Series appliances. Cyberoam NGFW come with Layer 8 Identity-based technology for actionable intelligence and controls that offer complete...
Sophos positioned in Gartner quadrant
Sophos has announced that it was, once again, positioned in the Leaders quadrant of Gartner’s 2013 Magic Quadrant for Mobile Data Protection. The quadrant is based on an assessment of a company’s market understanding, strategy and completeness of vision within the...
Kaspersky Lab wins AV-Test award
Kaspersky Lab is pleased to announce it has received a coveted AV-Test Innovation Award for its protection of online financial transactions. The experts at AV-Test were unanimous in recognising the overall effectiveness of Kaspersky Lab’s ability to protect financial...
HP announces expanded portfolio
HP recently announced new products and services that enable enterprises to disrupt the adversary marketplace, manage risk and extend their security capabilities to better protect themselves against a growing threat landscape. Cybercrime continues to increase, with 92%...