Africa's leading source of security and threat news
McAfee announces new endpoint protection and cloud security products
For organisations to adopt the cloud with peace of mind, they not only need visibility, but consistent data and threat protection policies across their data and applications.
Exclusive: Okta’s new GM shares its APAC strategy
“We believe that partnering with systems integrators, independent software vendors and consulting companies is a key factor of success for Okta.”
Frost and Sullivan recognises ForeScout’s achievements in NAC
ForeScout Technologies has announced it is the recipient of the Frost and Sullivan Growth Excellence Leadership Award in the network access control (NAC) market.
More OT devices added to Tenable's industrial security offering
Most operational technology systems run in heterogeneous environments, with devices from numerous industrial vendors, often relying on unique, proprietary protocols.
SailPoint improves security and compliance with SaaS update
New in IdentityNow is the Dynamic Discovery Engine, which allows users to easily and quickly create policies, access reviews, dashboards and reporting.
CyberArk launches privileged session management for cloud
An external attacker or malicious insider who is able to hijack these types of user credentials could shut down cloud environments.
Gartner’s top 10 tech trends for 2019
Gartner has released a list of what it sees as the most important strategic tech trends to be aware of in the quickly upcoming year.
ManageEngine adds user behaviour analytics to ADAudit Plus
With its dynamic alert thresholds, ADAudit Plus reduces the number of false positives and buys ample time for security teams to focus on the real indicators of compromise.
Securonix and Cylance partner to drive end-to-end security offering
The two products will provide security operations centre (SOC) teams with a view of both cloud and endpoint security events.
Small businesses repeatedly falling victim to ransomware - Kaspersky
Many SMBs have fallen victim to multiple attacks – with 37% having experienced two or three infections.
Interview: RSA's Craig Dore on the basics of MFA
A good MFA solution would cover access for both types of applications, and enable access for both employees and third parties such as contractors.
Exclusive: Cybersecurity in the API economy
Application programming interfaces (APIs) are the cornerstone of both connected devices and the connected experience.
Cryptomining dethrones ransomware as 2018’s top threat - Webroot
This report also highlights the importance of implementing a robust and evolving security approach to protect valuable data and keep systems secure.
Interview: Hitachi Vantara talks challenges of compliance in financial services
Technology is advancing a lot quicker, and the incumbent banks need to be more up to speed but are held back by a lot of legacy systems.
Google shutting down Google+ after covering up privacy bug
Google’s management was aware of the bug but chose not to share it with the public to avoid scrutiny by regulators.
Access to thousands of breached sites found on Russian underground market
A number of the available servers investigated by Flashpoint led analysts to conclude that most of the breaches are from either US, Russian, or German hosting services.
Industrial control systems: How to approach OT cybersecurity
As the ICS industry gives more consideration to cybersecurity, vendors must develop a more holistic view.
How online retail businesses need to bundle security into customer experience
E-commerce sites, in particular, are increasingly targeted by hackers due to the sensitive payment card information.
Barracuda introduces email protection bundle for channel partners
“Email security is now viewed as mission-critical and requires a multi-layered security approach.”
Microsoft makes security offerings available to nation states and law enforcement
Microsoft aims to empower IT to unlock the security capabilities of the intelligent cloud to tip the scales in the cyber war.
It’s an active buyer’s market for DDoS-as-a-Service - NETSCOUT
DDoS attacks are cheaper than ever for attackers, lucrative for the attack service provider and financially and operationally crippling for the victim.
Gartner names Sophos leader in Unified Threat Management
“We develop our cybersecurity products to work together as a system, enabling our defences to be as coordinated as cyber attacks.”
Hitachi Vantara delivers digital evidence management solution for law enforcement
Law enforcement officials are challenged by compliance policies and procedures such as evidence disclosure rules.
Living in today’s new cyber regulatory reality
in recent years, the cyber regulatory market has evolved into a well-defined, addressable market with metrics showing its impact in relation to other associated sectors
Exclusive: Aruba APAC CTO talks next steps for the region
“So suddenly, in our region, we have become almost early adopters of these new shifts in technological revolutions.”
The good and bad of Office 365 security
Let’s start with the positives. Office 365 adoption, and going cloud in general, is good for security.
CrowdStrike and Secureworks partner to integrate UEBA and endpoint protection platform
When the joint offering becomes generally available, both Secureworks and CrowdStrike customers will have access from additional countermeasures driven by the integration.
Pseudo-ransomware Xbash targeting Linux and Windows discovered
Xbash is data-destructive; destroying Linux-based databases as part of its ransomware capabilities.