New PCI access rules 1 August 2016, Security Services & Risk Management The PCI (Payment Card Industry) Security Council has extended its requirements for multi-factor authentication to anyone who has access to credit card data.
IndigoCube reseller of Outpost24 August 2016, News & Events, Products & Solutions Outpost24, a supplier of vulnerability management solutions, has named IndigoCube as exclusive reseller of its software in Africa.
RSA ups its identity game August 2016, Access Control & Identity Management, Infrastructure The new RSA SecurID Suite is an identity solution that combines the separate disciplines of access, governance, lifecycle and identity assurance, working together in harmony.
Shortage in cyber security talent August 2016 New report by Intel Security and CSIS reveals that the shortage in cyber security skills has done direct and measurable damage to companies’ reputation and loss of proprietary data.
Six principles of resilience to manage digital security August 2016, Security Services & Risk Management How can security professionals in South Africa protect their organisations when hackers beat two person authentication methods and highjacked authenticated sessions?
Calling for the cloud August 2016, Infrastructure Gartner predicts that by 2020, the stance against cloud technology will be as rare as the long-gone stance against the Internet, and adoption will be standard.
Who else is using your servers? July 2016 Kaspersky Lab exposes massive underground market selling over 70 000 hacked servers, with South Africa in the top 10.
Kaspersky to detect targeted attacks July 2016, Editor's Choice Kaspersky Lab announced a major expansion of its enterprise security product portfolio with a solution designed to detect targeted attacks: The Kaspersky Anti Targeted Attack Platform.
Virtual network July 2016, Salto Systems Africa, Products & Solutions, Access Control & Identity Management SALTO’s Virtual Network (SVN) is the first in the world to have data programmed into the card technology.
Data breach readiness June 2016, Editor's Choice This is the first of three articles on data breach readiness: Incident response and reputation protection plans are the key components of data breach management.
Ignorance is a criminal’s best friend June 2016 One-in-five could be signing away their privacy when they install a new app, Kaspersky Lab’s quiz shows.
Guiding businesses through testing times June 2016, Security Services & Risk Management New BT security consulting offer to guide businesses through testing times. Cyber Roadmap Consulting identifies weaknesses and recommends ways to strengthen security.
Cyber threats faced by the financial sector May 2016, Editor's Choice MWR’s research has uncovered six different types of threat actor, each with their own methods, context and incentives, but all similar.
Taking risk out of the payments channel May 2016 Online security breaches are becoming the order of the day and such incidences are set to rise as the economy comes under increasing pressure.
When advertising becomes dangerous May 2016, Editor's Choice “Leveraging an attack through a supplier proves an easier path to success than a direct attack on the intended victim.”
Surviving in the IoT world May 2016 Taking a random selection of the latest Internet-of-Things (IoT) products, Kaspersky Lab researchers have discovered serious threats to the connected home.