Seacom, Sophos partner to create SME security product

Seacom, Sophos partner to create SME security product

Seacom and Sophos have partnered to create an "out the box" security product for SMEs. Called 'On-Premise Security', the solution is a full suite offering that includes all licences and incorporates intrusion prevention, Web Application Firewall, and email security along with protection and control measures for web users and applications on the network.

Additional features include traff ... Read More

New Lazarus spyware spotted in the wild

New Lazarus spyware spotted in the wild

Kaspersky’s Global Research and Analysis Team has discovered a previously unknown spy tool, which had been spotted in Indian financial institutions and research centers. Called Dtrack, this spywa ... Read More

Increasing awareness of risk doesn

Increasing awareness of risk doesn't equal increasing investment into cyber insurance

Investment and finance businesses account for the lion’s share of organisations investing in cyber insurance, followed closely by healthcare. These were the findings of Aon's 2019 Global Risk ... Read More

Trust in AI grows

Trust in AI grows

If you ask the man on the street, he would prefer his cyber security managed by a machine. Research commissioned by Palo Alto Networks and conducted by YouGov along with input from Dr Jessica Barke ... Read More

5G: The next security battleground

5G: The next security battleground

Amid the ongoing battle between the Trump administration and Huawei around security concerns with the Chinese company's 5G network equipment, the majority of European Union member states have compl ... Read More

BEC attacks rise

BEC attacks rise

Business Email Compromise (BEC) attacks, emails containing dangerous file types, malware attachments and spam being delivered to users’ inboxes from incumbent email security systems, are not ... Read More

How effective is two-factor authentication?

How effective is two-factor authentication?

Should a password get hacked, it could expose the user to viruses, malware and data breaches on their mobile phones and other devices. Clever cyber crooks have the skills and the tools to easily cr ... Read More

Our partners: