HP strengthens security capabilities March 2010 New security services and solutions from HP address security from the printer to the cloud.
HP has introduced a security services portfolio and new solutions that offer increased vulnerability assessment, ...
Terabyte network overview March 2010 Cyberoam delivers a comprehensive view of all network devices, data redundancy.
Cyberoam iView, the open source logging and reporting solution is now available in appliance form, delivering a cost-effective ...
Comodo Dragon protects online privacy 26 February 2010 With Comodo Dragon, information about online exploration stays as much as possible within the user's PC
Network threats are evolving February 2010 To protect against the increasing sophistication of network security threats, enterprises must work diligently to adopt a comprehensive security solution.
Enterprise LAN and security professionals face ...
Just for the hack of it February 2010 Biodata IT says the local market must become more aware of the need to button up the network hatches.
South Africa is not much different from the international market when it comes to the effects of ...
E-threats are shifting February 2010 Cybercriminals continue to find creative means of distribution.
Malware writers have preserved their focus on Web-based attacks while actively looking for new methods to disseminate their products, ...
Wireless future January 2010, Technews Publishing (SA Instrumentation & Control), Integrated Solutions While many in the security industry think the move to IP (Internet Protocol) is the only technical change they will have to deal with, the emergence of wireless technologies is making inroads into almost ...
End point data protection January 2010 Cyberoam, a vendor of identity-based unified threat management solutions, has announced the launch of its End Point Data Protection suite to secure corporate data and manage IT assets. This suite extends ...
Cloud-based security services January 2010 Panda Security has unveiled the next generation of its cloud-based anti-malware services for home users and SMBs: Panda Cloud Antivirus and Panda Cloud Protection.
Panda Cloud Antivirus 1.0 is the industry’s ...
Autorun-based malware tops BitDefender’s November Top Ten Threat Report November 2009 Trojan.AutorunInf.Gen moves out of second place to take the lead.
BitDefender’s Top Ten Threat Report for November is topped by Trojan.AutorunInf.Gen. Trojan.AutorunInf.Gen, which came in second place ...
Crimes of our times October 2009 Recently the seventh annual e-crime survey has been published, this article will highlight several of the findings of the survey and also discuss a new modus operandi of these types of criminals.
Internet Solutions first to deploy FireID to corporate base October 2009 Internet Solutions has now integrated FireID into its VPN security layer, SecureConnect, and is offering all customers a choice of FireID or a hardware token for authentication
Trojans continue to dominate BitDefender’s top 10 e-threats for October October 2009 Trojan.Clicker.CM continues its hold as the number one e-threat
The top spot on BitDefender’s top ten list of e-threats for October is once again Trojan.Clicker.CM, which is mostly present on websites ...
BitDefender offers Twitter spam protection tips September 2009 What is the Twitter spam invasion? And how can you prevent it?
With the popularity of social networking platforms such as Twitter on the rise, cyber criminals have found an easy target among unsuspecting ...