Featured news
This guide is aimed at users in environments requiring stronger security controls in an operating system, making full use of the protection features offered in OS X. It would also be of use to system administrators wishing to enforce an organisation wide desktop security policy for Mac OS X.
Download the paper in PDF format here.
Spotlight
Whitepaper: Still using proxies for URL filtering? There’s a better way
Posted on 12 November 2014. | A standalone, proxy-based URL filtering solution remains to this day an isolated, disconnected tool - partially because it has an incomplete view of all network traffic, and due to its limited role among other security devices on the network.
How cybercriminals scam consumers during the holiday season
Posted on 11 November 2014. | McAfee announced its annual “12 Scams of the Holidays” list, which includes the most popular ways cybercriminals scam consumers during the holiday season as they surf their digital devices.
Application Threat and Usage Report 2014
Posted on 10 November 2014. | The report summarizes network traffic assessments performed worldwide in more than 5,500 organizations where 2,100 applications, 16,000 unique threats and billions of threat logs were observed.
After Silk Road 2, global law enforcement seizes other dark markets
Posted on 7 November 2014. | The takedown of online drug bazaar Silk Road 2.0 and the arrest of its alleged operator was only the first overt evidence of the success of a bigger law enforcement action.
WireLurker: Unprecedented iOS, OS X malware hits users
Posted on 6 November 2014. | Palo Alto Networks researchers have unearthed a new family of Apple OS X and iOS malware that is able to compromise even non-jailbroken iOS devices through enterprise provisioning.
Reading our newsletter every Monday will keep you up-to-date with security news.
Receive a daily digest of the latest security news.


