Obscure partners with BlackBerry

Jan 29, 2018

The company has signed an agreement with BlackBerry to sell the complete BlackBerry Secure platform in southern Africa.

Obscure announces distribution agreement with Kenna Security

Dec 13, 2017

This enables Obscure's partners to give their customers access to advanced cyber risk context technology for determining and remediating cyber risks.

Radware to open scrubbing centre in South Africa

Nov 2, 2017

This will allow African businesses to more quickly and effectively thwart DDOS attacks near their point of origin.

Obscure Technologies signs distribution agreement with Imperva

Sep 5, 2017

It will offer the Imperva portfolio of data and application security solutions that protect business-critical information in the cloud and on-premises.

Final countdown to GDPR - are you ready?

The €EU General Data Protection Regulation came into effect on 26 May 2016, and the two-year grace period ends on 25 May 2018, says Justin Lee, MD of Obscure Technologies.

Obscure Technologies signs deal with Palo Alto Networks

Jul 10, 2017

The agreement enables Obscure Technologies to offer the Palo Alto Networks Next-Generation Security Platform in South Africa and the SADC member states.

Security enables IOT world

Jul 22, 2014

The upcoming Blue Coat Advanced Threat Protection seminars in Johannesburg and Cape Town will explore the Internet of Things.

Blue Coat names Westcon regional distributor

Feb 11, 2014

Through the agreement, Westcon Security Solutions' resellers will be able to empower their enterprise customers, the companies say.

Partial thumbs up for iPhone security

Sep 13, 2013

Apple's new Touch ID technology is a step, not a solution, say security specialists.

SAPS hack spells negligence

May 22, 2013

Thousands of whistle-blowers have had their personal information made public, following a breach in the police's IT security.

How safe is your app?

May 9, 2013

Security loopholes in mobile apps threaten user privacy.

Most cyber attacks 'low-skilled'

Feb 13, 2013

Social engineering dominates the mobile threat landscape, with most mobile threats being superficial and avoidable.