Information Security



Arcserve launches N Series appliances
Issue 3 2022, Infrastructure
Arcserve introduces N Series appliances offering enterprise-level integrated data protection, recovery and cybersecurity to allow customers to simplify their IT environments and secure data.

Read more...
Securing business information more important than ever
Issue 3 2022, Products & Solutions
SMBs need to operate safely within the physical and virtual boundaries created by work-from-home business practices, as well as in-office operations.

Read more...
Storage is essential for a comprehensive cybersecurity strategy
Issue 3 2022, Integrated Solutions
Cyber resilience is the ability of an enterprise to limit the impact of security incidents by deploying and arranging appropriate security tools and processes.

Read more...
Malicious file protection for mobile devices
Issue 3 2022
The new version of Check Point Harmony Mobile, a mobile threat solution, can now block the download of malicious files to mobile devices, preventing file-based cyberattacks on organisations.

Read more...
Turnkey data loss prevention solution
Issue 3 2022, Infrastructure, Products & Solutions
Acronis’s expertise in data protection and the managed service provider market yields an innovative, fast-track approach for the prevention of catastrophic data leaks.

Read more...
The cybersecurity consolidation conundrum
Issue 3 2022, Editor's Choice, Healthcare (Industry)
Check Point discusses why less is sometimes more when it comes to securing your organisation from the innumerable cyberattacks happening every day.

Read more...
Companies continue to pay multiple ransom demands
Issue 3 2022, News & Events
Study reveals that 80% of companies that paid a ransom demand were hit again, nearly 50% reported paying a second ransom and nearly 10% paid a third time.

Read more...
DCC becomes sole Symantec distributor for South Africa
Issue 3 2022, News & Events
Drive Control Corporation (DCC) has been appointed the sole distributor for Symantec security solutions to the South Africa channel, and will now also be distributing Symantec into the SADC region.

Read more...
The evolution of vulnerability management
Issue 3 2022
As organisations focus on digitally transforming their enterprises, cybersecurity professionals have been facing an expansion of their attack surface – compounded by the digital explosion during the pandemic.

Read more...
VMware enhances its lateral security for multi-cloud
Issue 3 2022, Technews Publishing
Ahead of RSA Conference 2022, VMware introduced Contexa, VMware’s full-fidelity threat intelligence capability that observes the breadth of VMware’s network, endpoint, and user technologies.

Read more...
Securing mobile devices for a remote workforce
Issue 3 2022
As a channel to your personal data, banking and accounts, and a link to your work and business data, smartphones drive cybercriminals directly to your pocket.

Read more...
XM Cyber counters attacks involving Microsoft Active Directory exploits
Issue 3 2022
XM Cyber unveils first solution to reveal entire attack paths across AD and other vectors, aiding remediation and continuously protecting critical assets.

Read more...
How to stop the costliest internet scam
Issue 3 2022
While ransomware, hacking, API hacks, and all the other cybersecurity threats make headlines, it is worth remembering that the costliest internet scam is still business email compromises.

Read more...
How the MITRE ATT&CK Framework has revolutionised cybersecurity
Issue 3 2022
The MITRE ATT&CK framework is the most widely adopted and used by industry experts; what’s more, it is free and provides businesses with a fantastic source of information to strengthen their security posture.

Read more...
Trying to catch the big phish
Issue 3 2022
Rather than focus on techniques, John Mc Loughlin, CEO of J2 discusses how phishing applications have changed to match new security standards.

Read more...
Corporations protected, but not secure
Issue 3 2022, News & Events, Security Services & Risk Management
Nearly three quarters of South Africa’s top 100 corporates are investing more in cybersecurity than the industry average, but an almost equal proportion don’t feel fully protected by their current cybersecurity strategy.

Read more...
People and processes for banking security
Issue 3 2022, Guardian Eye, Security Services & Risk Management
South Africa is the third most-targeted country worldwide when it comes to cybercrime and it is no different with the local banking sector, which needs to ensure its systems and people are ready.

Read more...
Dashboard for streamlined ransomware recovery
Issue 2 2022
The new CyberSense interface provides intuitive post-attack forensic reports that provide powerful insight into data corruption due to a ransomware attack, facilitating ransomware recovery.

Read more...
You have a ‘super malicious insider’
Issue 2 2022
There’s a super malicious insider who is technically proficient and often acutely aware of an organisation’s technical limitations in proactively detecting insider threats.

Read more...
Secret monthly fee
Issue 2 2022, Kaspersky
Kaspersky researchers have observed fraudsters actively spreading Trojans, which secretly subscribe users to paid services, disguised as various mobile apps, including popular games, healthcare apps and photo editors.

Read more...



<< First   < Previous   Page 19 of 87   Next >   Last >>








While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.