Own your digital identity this summer
OThe arrival of summer is the perfect opportunity for young South Africans to log on to the worldwide web and claim their digital identities within the dotZA (.ZA) and dotAfrica (.africa) namespaces. “Schools are out and the youth are now able to turn their bright...
Questions to ask before choosing your anti-malware solution
Security vendors such as Kaspersky Lab report that they process as many as 360,000 new malicious file variants a day, making it clear that everyone who uses a computer for personal tasks and work still needs robust protection against viruses and malware. By Alan...
Predictions for data in the year ahead
Data is only becoming increasingly important for business success, while also getting more challenging to manage. By Jasmit Sagoo, senior director and head of technology UK&I at Veritas Technologies For large, established organisations with massive legacy...
Trend Micro announces launch of Cloud One
Trend Micro has announced the launch of Trend Micro Cloud One, a security services platform for organizations building applications in the cloud. Cloud One allows developers to rapidly build applications using the cloud services they want, while managing their...
Extending security to the cloud
Business leaders now have a choice whether they want to continue using their trusted firewall or move to a next-generation firewall delivered by appliances or as cloud services to protect the outer perimeter security in branch offices. Troye technical director Kurt...
SearchInform launches security outsourcing service
SearchInform has launched an information security outsourcing service for companies that face the problem of corporate fraud and data leakage. At the same time, organisations do not have the staff or resources for a one-time purchase of equipment and software for...
Mimecast challenges Shadow IT
Mimecast has announced the release of added application visibility and control capabilities to its Mimecast Web Security service. Application Visibility and Control will help Mimecast customers overcome the challenge of Shadow IT by uncovering cloud app usage within...
2020 cybersecurity predictions
With data breaches hitting headlines daily, security professionals are constantly concerned about the next big threat. Whether it's ransomware, phishing or endpoint attacks, there's always something on the horizon waiting for its turn in the spotlight. KnowBe4 has...
Tis the season to be cautious online
As the festive season nears, cybercriminals start to prey on our online security vulnerabilities. In this digital era, we rely heavily on efficiencies that make our lives easier. By Corien Vermaak, cyber security specialist at Cisco According to Deloitte's annual...
Trend Micro leads in hybrid cloud security market share
Trend Micro has been named by IDC as the number one vendor in Software-Defined Compute (SDC) workload protection, according to the analyst firm's new independent report: Worldwide Software Defined Compute Workload Security Market Shares, 2018. The report revealed...
Get rid of password stress – forever
VPN service provider NordVPN has launched NordPass, a password manager built with a focus on simplicity and security. When it comes to cybersecurity, people have plenty of bad habits. This includes passwords too: from keeping login information in sticky notes or...
Be awake to the deepfake
South Africa's Wireless Application Service Providers' Association is advising smartphone users alarmed by the 'deepfake' phenomenon that the expected promulgation of South Africa's Cybercrimes and Cyberbullying Bill is imminent. Furthermore, there are practical ways...