Strengthening cybersecurity with a zero trust approach
In response to sophisticated and targeted cyberattacks, organisations have begun to shift their focus to proactive strategies that employ advanced cybersecurity technology and techniques. Threat Hunting, a strategy for investigating potential threats before they cause...
Check Point debuts Malware DNA
Check Point Software Technologies has introduced a new artificial intelligence-based malware detection engine to its SandBlast Network threat prevention solution, to enable even faster, more accurate prevention of malicious attacks. The new Malware DNA engine...
Kaspersky enables machine learning to protect against advanced threats
Kaspersky Internet Security for Android has been strengthened with a new feature for combating the evolving malware landscape - Cloud ML for Android. The new feature, based on machine learning technology, ensures immediate proactive detection of advanced and...
Protecting cryptocurrency in Africa
With bitcoin experiencing a price rally recently, interest in this and other cryptocurrencies are regaining momentum. The potential disruption from these digital currencies, especially in Africa, can be significant for traditional financial service providers. However,...
LoudMiner uses virtualisation software to mine cryptocurrency
ESET researchers have discovered an unusual cross-platform cryptocurrency miner called LoudMiner. LoudMiner uses virtualization software - QEMU (short for Quick Emulator) on macOS and VirtualBox on Windows - to mine cryptocurrency on a Tiny Core Linux virtual machine....
Four essential cloud security concepts
Possibly the most important attribute of the cloud is that critical business applications, can be deployed, managed, and distributed faster and easier than by any other method, giving employees and customers real-time access to critical information--wherever they are...
BT enhances its cyber capabilities in Europe
BT has announced the opening of a new Cyber Security Operations Centre (Cyber SOC) in Paris, as well as announcing upgraded facilities, new customer solutions and recruitment at its existing SOCs in Madrid and Frankfurt. BT’s global network of Security Operations...
Imperial College protects research data with software-defined storage
Solutions from ArcaStream and Excelero are part of a new software-defined storage deployment at Imperial College London, one of the world's leading university research centres for science, engineering, medicine and business. By moving to a single high-performance...
Demystifying cloud cybersecurity
With the rise of edge data centres and an increase in cloud-based computing, companies are facing new challenges in end-to-end cybersecurity. To ensure proper protection, data centre teams must now assess both internal processes and strategies used by cloud suppliers....
Eset is Canalys cybersecurity champion
Eset has achieved Champion status globally for the first time in Canalys Cybersecurity Leadership Matrix 2019. Canalys is a leading global technology market analyst firm with a channel focus; it strives to guide clients on the future of the technology industry and to...
Building a zero trust environment
People are the new perimeter and identity is at the very core of maintaining a secure, trusted environment. New technologies and trends, including the mobile workforce, BYOD, IoT, digital transformation, and the consumerisation of IT, are shifting identity and access...
Unseen cloud threats exposed
Check Point Software Technologies has announced the release of CloudGuard Log.ic, a solution which delivers cloud-native threat protection and security intelligence. Using CloudGuard Log.ic, customers can now see every data flow and audit trail in today’s elastic...