Trend Micro Q1 2015 roundup finds new variations on proven attack methods
By Staff Writer 19 May 2015According to Trend Micro, a combination of newer and older threat variations defined the cybersecurity landscape in the first quarter of 2015. FULL STORY >
Tarsus emerging markets appointed as Intel security distributor
By Staff Writer 11 May 2015Tarsus Emerging Markets, part of the Tarsus Technology Group (formerly MB Technologies) has recently been appointed as distributor for Intel Security in sub-Saharan Africa, excluding South Africa. FULL STORY >
RSA Conference 2015: Trend Micro showcases adaptive protection to defend against targeted attacks
By Staff Writer 11 May 2015Trend Micro today announced it will showcase its solutions to support customers in their defense against, and response to, targeted attacks at RSA Conference 2015. FULL STORY >
Fortinet’s best of breed solutions combine with Cisco ACI to deliver SDN security
By Staff Writer 6 May 2015Integration of Fortinet’s FortiGate with Cisco ACI offers enterprises high levels of SDN security, privacy and compliance in cloud and data centre environments FULL STORY >
Betting the farm on untested tech
By Staff Writer 5 May 2015While a plethora of new payment solutions are coming to market, businesses should be cautious about moving to new solutions just for the sake of it. FULL STORY >
Panda Security introduces Endpoint Protection with protection for Android
By Staff Writer 5 May 2015In recent months Panda Security has undergone several changes regarding the company’s appearance and identity. FULL STORY >
Intel Security collaborates with Ericsson to bring managed security to telecom operators
By Staff Writer 28 April 2015Ericsson and Intel Security are working together to make managed security solutions available for telecom operators to bundle with the existing services they provide to enterprises. FULL STORY >
Dimension Data launches new assessment that helps organisations assess their security architecture
By Staff Writer 17 April 2015Traditional approaches to information security are no longer adequate to protect information networks from modern threats FULL STORY >
Specialised storage for security systems
By Staff Writer 16 April 2015When it comes to surveillance systems today, the Digital Video Recorder (DVR) is the heart of any solution FULL STORY >
BT launches BT Assure Cyber
By Staff Writer 15 April 2015BT has announced the launch of BT Assure Cyber, an advanced security platform designed to offer complete and comprehensive monitoring, detection and protection against cyber threats targeted at private sector and government organisations. FULL STORY >
New research reveals wide gap between perception and reality of perimeter security effectiveness
By Staff Writer 15 April 2015Security company Gemalto, has released the latest findings of the 2015 Data Security Confidence Index (DSCI). The report reveals a widening gap emerging between the perception and the reality of... FULL STORY >
Enterprise security threat level directly linked to user demographics, industry and geography
By Staff Writer 14 April 2015Global study by Aruba Networks shows more than half of South African workers are not concerned about an online security threat FULL STORY >
Standard Bank debuts first biometric banking app in SA
By Staff Writer 9 April 2015Standard Bank launches South Africa’s first biometric mobile banking solution for iOS users, utilising Apple’s TouchID technology. FULL STORY >
Escalating attacks: POPI regulator could help
By Staff Writer 30 March 2015Fast tracking the appointment of the POPI Information Regulator could help increase disclosure and dialogue around cyber security, says Fortinet. FULL STORY >
Cloud Security – Do you know how and where your data is stored?
By Staff Writer 17 March 2015Cloud computing services, like many new and exciting technical offerings, can be both risky and beneficial to businesses. FULL STORY >
Most Read Articles

Have Your Say
What new tech or developments are you most anticipating this year?


