May 31, 2013
Threat emulation is a critical technique in achieving more effective network security. “Know your enemy as well as you know yourself” is a frequently-quoted statement in IT security, says Doros Hadjizenonos, sales manager at Check Point South Africa. ...
May 8, 2013
During the first quarter of 2013 alone, more than 6,5-million new malware samples were created, following the trend of increasingly prevalent malware statistics of previous years. This is according to the PandaLabs Quarterly Report for Q1, which analysed the IT...
May 6, 2013
Businesses which have opened up their IT infrastructures to user-owned mobile devices, through bring your own device (BYOD) policies, need to take firmer steps to secure their data and networks from a growing range of security threats. That’s the word from William...
Apr 15, 2013
The rate at which technology is currently progressing is so rapid that almost all government legislation regarding technology is out of date by the time it is written into law. In an attempt to prevent this, governments try to make legislation as technology neutral as...