Emulating the enemy

Threat emulation is a critical technique in achieving more effective network security. “Know your enemy as well as you know yourself” is a frequently-quoted statement in IT security, says Doros Hadjizenonos, sales manager at Check Point South Africa. ...

Trojans dominate Q1 threat landscape

During the first quarter of 2013 alone, more than 6,5-million new malware samples were created, following the trend of increasingly prevalent malware statistics of previous years. This is according to the PandaLabs Quarterly Report for Q1, which analysed the IT...

Businesses vulnerable to mobile threats

 Businesses which have opened up their IT infrastructures to user-owned mobile devices, through bring your own device (BYOD) policies, need to take firmer steps to secure their data and networks from a growing range of security threats. That’s the word from William...

Navigating the morass of technology threats

The rate at which technology is currently progressing is so rapid that almost all government legislation regarding technology is out of date by the time it is written into law. In an attempt to prevent this, governments try to make legislation as technology neutral as...