Wildcard certificates are a security risk
As the name suggests, the value of a Wildcard SSL certificate varies and is determined by its audience. There are several risks associated with this certificate type, says Megan Rehbock, LAWtrust certificate service manager. Wildcard certificates, which support all...
Local Android users at risk of cyber-attacks
In light of the rising number of cyber-attacks targeting the Android operating system (OS) in recent months, ESET, the leader in proactive digital protection, has announced the launch of its new ESET Mobile Security app for local Android smartphone and tablet users....
Panda offers Cloud Office Protection v.6.70
Panda Security, The Cloud Security Company, has released Panda Cloud Office Protection (PCOP) version 6.70, featuring significant technological and functional improvements, to help SMBs combat the growing number of cyber-attacks they are experiencing. According to...
Size immaterial when it comes to security
IT security has no respect for size. A hacking group can have hundreds or thousands of members globally, like anonymous, or just a handful, like the group that mounted the successful Eurograbber attacks against banks in 2012 – but in either case, the disruption to the...
Bytes, OneVault offer biometric solution
Bytes Systems Integration has partnered with authentication service provider OneVault and will integrate OneVault’s hosted voice biometric solutions into its solution offerings. Bytes SI’s main focus lies in providing innovative solutions by integrating products,...
McAfee enhances Security Connected porfolio
McAfee has announced the addition of identity and access management solutions to its Security Connected portfolio. The new solutions that were previously sold and developed by Intel, include McAfee Cloud Single Sign On and McAfee One Time Password. McAfee also...
Insider data leaks a real risk for companies
South African companies are generally well aware of the dangers of external hacking attacks but often overlook the threat of internal data leaks – whether malicious or accidental. Companies in mining and construction tend be more vulnerable than they realise, and...
Gartner recognises Sophos as leader
Sophos has announced that it has once again been positioned in the “Leaders” quadrant of Gartner’s 2013 "Magic Quadrant for Unified Threat Management". The quadrant is based on an assessment of a company’s ability to execute and completeness of vision. Sophos is the...
Library security boosts asset management
Book theft, which has steadily increased over the past few years, is the most common crime in South African libraries and can have a significant impact on the bottom line. However, local developments of advanced library security technologies can reduce these losses,...
WatchGuard, Network Alliance join forces
National Information and Communication Technology service provider Network Alliance and global security solutions and services provider, WatchGuard, have joined forces to provide clients with up-to-date technology and reliable services to help them better protect...
Gateway encryption eases cloud concerns
Cloud computing has moved well beyond buzzword status to become a bona fide business-enabling technology area that can be used enterprise-wide, by sales, marketing, procurement and line of business, and for multiple purposes – including collaboration, says Tony...
Check Point introduces 13500 Appliance
Check Point Software Technologies, a worldwide leader in securing the Internet, has announced the launch of its 13500 Appliance, the first in a new line of 13000 Appliances designed specifically to expand the company’s data centre network security offerings....