9.1 C
Johannesburg

Network monitoring tools: Features users love and hate

Managing the health of the corporate network will directly affect the productivity of every user of that network. So network administrators need a robust network monitoring tool that...

10 ways to achieve ROI on a network solution

Measuring ROIImage by ThinkstockWith the advent of Bring Your Own Device (BYOD), WLAN network access to customers and visitors and virtualized systems, the demand for IP addresses has exploded. Small companies...

What to ask when selecting application security solutions

Buying decisionsImage by ThinkstockThere are many factors to consider when making an application security purchasing decision, and the pressure is on organizations now more than ever to improve their...

What’s in the fine print of your disaster recovery vendor agreement?

Sign on the bottom lineImage by ThinkstockDisaster-recovery solutions require several complex, moving parts coordinated between your production site and the recovery site. Service-level agreements are ultimately the most accurate...

Fight firewall sprawl with AlgoSec, Tufin, Skybox suites

New and innovative security tools seem to be emerging all the time, but the frontline defense for just about every network in operation today remains the trusty firewall....

Review: Canary Flex security camera lives up to its name

Canary’s initial foray into the networked home security camera space was very impressive – my colleague David Newman touted its high security settings in the wake of revelations...

Security Concerns on the Rise for Foreign Travelers in Nigeria

The international community looked on with increasing concern and interest last week as the security situation in parts of Nigeria looks increasingly volatile. The kidnapping of two German...

Addressing the Continued Risk of Zika: Protection, Prevention and Communcation

With Zika now a “foreseeable” risk under Duty of Care, organizations are realizing their potential liability and are proactively mitigating their employees’ exposure to the threat by educating...

Proactive Planning for International Response and Recovery

In the wake of disasters like Nepal’s earthquake, proactive efforts provide a significant return on investment when reacting to the extraordinary challenges of response and recovery; they...

3 Key Steps to Implement an Overseas Security Project

From big box retailers and gourmet coffee shops to oil and gas companies, software firms and major automakers, U.S.-based businesses continue to expand their reach with global...

Latest article

CVE-2020-13623 (jerryscript)

JerryScript 2.2.0 allows attackers to cause a denial of service (stack consumption) via a proxy operation. Read more

MTN Nigeria to issue R2.2bn in bonds

The mobile operator will issue 50 billion naira in the West African country, as it seeks new sources to support operations.Read more

CVE-2020-8170

We have recently released new version of AirMax AirOS firmware v6.3.0 for TI, XW and XM boards that fixes vulnerabilities found on AirMax AirOS...