Symantec Corp. today expanded its ability to protect enterprises against web-based threats with the addition of Web Gateway 4.5 to its Symantec Protection Suite Enterprise Edition. The Web security appliance provides comprehensive protection by employing multiple layers of anti-malware technologies including Symantec’s antivirus engine to protect customers against today’s most...
A recently released report by F5 Networks has shed light on the frequency and nature of web application attacks. The first annual Application Protection Report from F5 surveyed 3,135 IT and security practitioners across the globe, while additional research conducted by Whatcom Community College (University of Washington Tacoma), along...
Cybercrime remains a looming threat in the ICT sector and doesn't show any signs of slowing down. Cybercriminals continue to find new and sophisticated ways to override security protocols for malicious purposes. In 2017, we saw the rise of ransomware as it swept through both large and small-scale businesses, wherein...
Following on this week’s Life Healthcare cyberattack, the issue of cybersecurity has once again been brought to the fore as businesses and individuals are forced to evaluate whether measures in place are strong enough to withstand major breaches in their security. Life Healthcare is the third major South African company...
If you knew just how valuable your identity was, would you pay more attention to securing it? A recent Kaspersky Lab study revealed that digital identity data and information holds significant value to cybercriminals – who craft ways of gaining this data without potential victims knowledge and exploit it...
Kaspersky Lab, a developer of secure content and threat management solutions, presented the results of a study conducted by its Global Emergency Response Team – a consulting service for the company’s corporate users. The data that was accumulated while serving corporate customers highlights the main IT security policy mistakes that...
Over the years there has been many security breaches, with companies such as eBay being targets. The info graphic, which was submitted by whoishostingthis.com, has visualised the 8 biggest security breaches in history —covering how and why we should be careful as no system is impregnable. Some of the breaches...
Criminals look to attack businesses embracing the Internet of Things (IoT), targeting small to mid-sized enterprises (SME) providing services to global organisations. One of the predictions made in the 2018 Cybersecurity Predictions released by Stroz Friedberg, an Aon Company, is that global organisations will need to factor the way their...
On Wednesday, 21 November, online retailer Amazon announced that a website glitch accidentally exposed names and email addresses of some of the e-commerce giant's customers. According to the company, there was no breach of Amazon systems or its website, and passwords were kept safe. It’s unclear at this time how many...
The mindset of management can be the biggest obstacle to a secure IT environment and a strong security and risk management posture. So says Marthinus Engelbrecht from NEWORDER Industries, a local technology company that provides specialised enterprise risk management, IT security, virtualisation and storage solutions and services to companies in...
The COVID-19 pandemic has taken a huge toll worldwide for both individuals and economies. As a precaution, many countries have implemented strict lockdown measures such as closing schools, restaurants and borders, while mask-wearing in public and social distancing have become a must. The enforcement of these policies, along with the...
Hackers broke into the computer systems of the Barack Obama and John McCain campaign teams during the US presidential race and stole a ''serious amount of files" in an operation that US government cyber experts believe originated from China. The Secret Service and FBI warned Obama and McCain earlier this...
Rack Centre has obtained the global ISO/IEC27001:2013 certification for an Information Security Management System. ISO/IEC 27001:2013, an Information Security Management System is the most rigorous global standard for information security and confirms that an organisation has put in place best practices for information security processes and is ensuring data...
Switching to working from home was difficult, but oddly enough, returning to the office may be just as tricky. Organisations will have to roll back some changes, which could be as complex as when they were deployed in the first place. They will also need to re-ensure the security of internal...
Valentine's Day – a day to tell the people you love exactly how much you love them. However, it is also a day that virus writers love, too. For the past few years, Kaspersky Lab has witnessed a disturbing trend in spam e-mails. Mass mailings of Trojans and worms...
As part of its 13th Annual Worldwide Infrastructure Security Report (WISR), Arbor Networks, the security division of NETSCOUT, has released its ATLAS (Active Threat Level Analysis System) special report, which collates data from NETSCOUT Arbor SP deployments from across the globe. ATLAS effectively delivers insight into approximately one-third of global...
9,800FansLike
0FollowersFollow
22,877FollowersFollow

Recent Posts