New research reveals wide gap between perception and reality of perimeter security effectiveness
By Staff Writer 15 April 2015Security company Gemalto, has released the latest findings of the 2015 Data Security Confidence Index (DSCI). The report reveals a widening gap emerging between the perception and the reality of... FULL STORY >
Enterprise security threat level directly linked to user demographics, industry and geography
By Staff Writer 14 April 2015Global study by Aruba Networks shows more than half of South African workers are not concerned about an online security threat FULL STORY >
Standard Bank debuts first biometric banking app in SA
By Staff Writer 9 April 2015Standard Bank launches South Africa’s first biometric mobile banking solution for iOS users, utilising Apple’s TouchID technology. FULL STORY >
Escalating attacks: POPI regulator could help
By Staff Writer 30 March 2015Fast tracking the appointment of the POPI Information Regulator could help increase disclosure and dialogue around cyber security, says Fortinet. FULL STORY >
Cloud Security – Do you know how and where your data is stored?
By Staff Writer 17 March 2015Cloud computing services, like many new and exciting technical offerings, can be both risky and beneficial to businesses. FULL STORY >
Take it down a gear
By Staff Writer 10 March 2015With consumer demand at an all-time high, and with software developers being pushed to release new connected car software with the most up-to-date features, it seems that security is taking a back seat, says Martin Walshaw, senior engineer at F5 Networks. FULL STORY >
Improving security in residential estates
By Staff Writer 9 March 2015Security is by far the largest concern for any residential estate and to stay a step ahead of criminals, they need to embrace technology. FULL STORY >
The Number of Financial Attacks Against Android Users Tripled in 2014
By Staff Writer 5 March 2015The Kaspersky Lab study ‘Financial Cyberthreats in 2014’ reports that the number of financial malware attacks against Android users grew by 3.25 times in 2014. Following an initial decrease in March 2014, Kaspersky Lab... FULL STORY >
Kaspersky Lab Presents a New Total Security Solution to Safeguard Digital Lives
By Staff Writer 4 March 2015Kaspersky Lab has released Kaspersky Total Security – multi-device, a security solution for home users that protects Windows, OS X, Android, iOS and Windows Phone platforms. The solution is the successor to... FULL STORY >
The importance of securing the home office
By Staff Writer 12 February 2015SOHOs and staff working from home tend to overlook the cyber security risks around their home office, warns Networks Unlimited, distributor of Fortinet. FULL STORY >
Vodacom Business launches BYOD security solution
By Staff Writer 28 January 2015Vodacom Business has stepped in with a new solution which gives IT security managers the tools needed to safely bring BYOD under control. FULL STORY >
Fortinet 2014 Security Census
By Staff Writer 8 December 2014Fortinet’s latest survey illustrates just how important a concern security has become for enterprises, with CIOs and CTOs fully aware of its significance to business operations. FULL STORY >
Cyber wars – staying safe on the worldwide web
By Staff Writer 15 October 2014The issue of web security is not a new one. However, since our migration to the digital age, organisations are now facing rapidly changing risk landscapes at a frightening pace. Cyber risks are growing exponentially and attacks are becoming more... FULL STORY >
Trend Micro Mobile Security is industry’s first solution to block mobile malware
By Staff Writer 16 September 2014Trend Micro Incorporated, a global developer of cyber security software, today announced the availability of the latest versions of its consumer mobile security solution, Trend Micro Mobile Security for Android... FULL STORY >
Advanced Persistent Attacks and how to deal with them
By Ryan Noik 16 September 2014Fortinet’s Jonas Thulin speaks to TechSmart Business about why Advanced Persistent Threat attacks are not your ordinary intrusions and how enterprises can cope. FULL STORY >
Most Read Articles
Have Your Say
What new tech or developments are you most anticipating this year?