Malware never sleeps

Malware is always changing, adapting, being rewritten and re-released in a seemingly infinite number of ways, with the express intention of making your life difficult – and making the writers or owners of the code as much money as possible.  Security threats have...

Emulating the enemy

Threat emulation is a critical technique in achieving more effective network security. “Know your enemy as well as you know yourself” is a frequently-quoted statement in IT security, says Doros Hadjizenonos, sales manager at Check Point South Africa. ...