SECURITY

Anton Jacobsz, MD at Networks Unlimited

The sum of details at hand equals the quality of a cyber threat investigation

Just like any detective investigating a crime scene, security analysts need to be able to access all the information pertaining to any threat incident they are investigating.  Read More

08:42
ATM/card-related frauds rise 11.95%ATM/card-related frauds rise 11.95% Fraud cases perpetrated through the use of automated teller machine (ATM) and other card payment system ...
08:25
Lawmakers want TSA investigatedLawmakers want TSA investigated Nigeria’s lower house, the House of Representatives, is making moves to investigate how much has ...
06:52
Identity thieves target used hard drivesIdentity thieves target used hard drives Companies need to take measures to wipe the hard drives of obsolete technology before selling or ...
14:56

MORE SECURITY NEWS

Monday 27 Jun

Cybercrime in South Africa: The battlefield has shifted

Although the majority of South African businesses are investing in their security infrastructure, many are doing so in the wrong places. »
Monday 27 Jun

RSA acknowledged by Frost & Sullivan for excellence and innovation in its network security forensics

RSA, The Security Division of EMC, has been determined by Frost & Sullivan as winner of the 2016 Global Frost & Sullivan Enabling Technology Leadership Award in Network Forensics for RSA Security Analytics. »
Friday 24 Jun

Top targets for cyber attacks in East Africa

KENYA
Governments are East Africa’s top target sector for cyber attacks, followed by telecoms and financial  services, says a report by Control Risks.»
Friday 24 Jun

Connecting the dots: respond-to-alerts based security posture will not protect

According to an Arbor paper, “Connecting the Dots in Enterprise Security”, advanced threats target a specific company, are designed to bypass traditional controls, and comprise a planned and orchestrated set of attack activities.»
Thursday 23 Jun

DNS attacks on the increase, concern for SA firms

South African organisations will likely see an increase in the volume and severity of network attacks over the coming years, says Arbor Networks.»
Tuesday 21 Jun

BVN fished out 40,000 ghost workers

NIGERIA
Nigeria’s Minister of Industry, Trade and Investment says the Bank Verification Number introduced by the Central Bank of Nigeria has saved the Federal Government billions of naira.»
Monday 20 Jun

RSA: 75 percent of organisations at significant risk of cyber incidents

RSA, The Security Division of EMC, has released data demonstrating that organisations that invest in detection and response technologies, rather than perimeter-based solutions, are better poised to defend against cyber incidents. »
Thursday 16 Jun

DDoS attacks don’t have to mean ‘game over’

The problem of inadequate protection from DDoS attacks is a growing concern for South African organisations, says Arbor Networks.»
Monday 13 Jun

DNS attacks on the increase, concern for SA firms

Arbor Networks Annual Worldwide Infrastructure Security Report provides a rare insight into the nature of today’s network security threats, and the ways in which enterprise network operators and service providers are facing up to these challenges. »
Thursday 9 Jun

Arbor Networks Spectrum v2.1 pioneers new network approach for security teams

Arbor Networks Inc., the security division of NETSCOUT, has introduced version 2.1 of Arbor Networks Spectrum, its advanced security analytics and threat-hunting platform, to the African region. »
Tuesday 31 May

Things to ask your MSSP to increase your network’s security

Arbor Networks has drawn up five questions to ask an MSSP to better ensure security throughout your organization.»
Monday 30 May

Unpacking penetration testing for SMEs

MWR Infosecurity outlines penetration testing best practice for SMEs.»
Friday 27 May

Separating the attack that matters from the noise

It has almost become the norm for a business to be compromised by a security attack. The emphasis today is thus more on how a business responds to the attack, that is how have they prepared for the breach and how do they communicate it? »
Tuesday 24 May

Enhancing your security posture to fight new ransomware threats

Petya ransomware is proving to be one of the top cybersecurity stories of 2016. »
Tuesday 24 May

Arbor stops malware in its tracks

There is always a substantial amount of banking trojan activity taking place, however, recent developments have intensified the threat landscape. »
Friday 20 May

Networks Unlimited certifies Fortinet partners in East Africa

KENYA
Value-added distributor, Networks Unlimited is intensifying its footprint in East Africa, training its partners and customers in the region to become certified.»

PRESS OFFICES

Sage EnterpriseSAP AfricaTrust PayVMWareSamsung ElectronicsMitsumi DistributionPhoenix DistributionMTN BusinessSchneider ElectricMultichoiceMicrosoft 4AfrikaNetworks UnlimitedArbor NetworksEricssonTigo Ghana

FEATURED STORY

Government should encourage youths in ICT earlyGovernment should encourage youths in ICT early

Youths should be given more encouragement to develop their ICT skills, an 11-year-old app developer told Kokumo Goodie.

IN DEPTH

IBM Opens First Cloud Data Centre in South AfricaIBM Opens First Cloud Data Centre in South Africa

IBM is opening a new IBM Cloud Data Centre in Johannesburg, South Africa. The new cloud center is the result of a close collaboration with Gijima and Vodacom and is designed to support cloud adoption and customer demand across the continent.  

COMPANY NEWS

Tigo, JI and GES equip teachers on child online protection initiative

Tigo, in partnership with J Initiative (JI), a youth focused non-governmental organisation in Ghana, have committed to protecting children online through policy advocacy, awareness creation, public education ...