|Email is the weak link
July 2017, This Week's Editor's Pick, Security Services & Risk Management
Email remains any firm’s most important business tool and 43-trillion emails are sent annually The problem with email is that it was not designed to be secure.
|Can you survive a cyber attack?
July 2017, ContinuitySA, Security Services & Risk Management
The Cyber Resilience Framework provides a comprehensive, flexible structure to ensure organisations can survive cyber attacks.
|Don’t ignore the mobile threat
50% of all mobile and tablet devices are not protected against cybercrime and malicious threats, that equates to about 40 million entry points into corporations and company networks.
|Cybersecurity for access control
July 2017, This Week's Editor's Pick, Access Control & Identity Management, Asset Management, EAS, RFID
Farpointe provides cybersecurity vulnerability checklist for contactless cards and readers.
|Biggest threat to industrial systems
July 2017, This Week's Editor's Pick, Security Services & Risk Management, Industrial (Industry)
The biggest threat to industrial control systems since Stuxnet is Industroyer, a sophisticated and extremely dangerous malware designed to disrupt critical industrial processes.
|Card fraud stats 2016
June 2017, This Week's Editor's Pick, News, Security Services & Risk Management
Credit card fraud increased by 13% from R331.4m in 2015 to R374.4m in 2016, with debit card fraud increasing by 3.1% for the same period.
|Data governance and the security industry
June 2017, Technews Publishing, IT infrastructure, Security Services & Risk Management
So how does all the talk about data governance and data protection impact the security industry? Or does it?
|Physical security is from Mars, IT is from Venus
June 2017, Axis Communications SA
The days of separating physical and digital security are over. Today we need a collaborative approach to succeed in preventing and/or dealing with cyber attacks.
|Hikvision and Cisco collaborate on cybersecurity
June 2017, Hikvision South Africa, This Week's Editor's Pick, CCTV, Surveillance & Remote Monitoring, News
Cisco is sharing its professional cybersecurity management experience and technologies with Hikvision, facilitating Hikvision’s globalisation process.
|Cyber-attacks to the left, ransomware to the right
June 2017, This Week's Editor's Pick, News
We all need to be agile and responsive to the new unknowns; here are some tips for preventing future nasties like WannaCry and Petya.
Securex 2017 preview
Procore Trading’s Intimus 9000 Degausser uses most modern APT technology to erase information from hard drives. The Intimus 9000 produces an erasing field many times stronger than those produced by the ...
|Accelerating the community theme
May 2017, Milestone Systems, This Week's Editor's Pick, CCTV, Surveillance & Remote Monitoring, News
Milestone Community Days EMEA (MIPS) in Dubai highlighted the company’s platform strategy, connected products for the small and medium-sized businesses and higher performing software.
|Trusted Platform Module explained
May 2017, Bosch Security Systems, This Week's Editor's Pick, CCTV, Surveillance & Remote Monitoring
Bosch IP cameras, encoders and selected storage systems have an onboard security chip – actually a system-on-a-chip called the Trusted Platform Module – that provides functionality similar to crypto smartcards.
|Niall Beazley looks at some of the issues end users should consider when deciding on surveillance solutions: you get what you pay for.
May 2017, Vision Catcher, CCTV, Surveillance & Remote Monitoring, Integrated Solutions
Niall Beazley looks at some of the issues end users should consider when deciding on surveillance solutions: you get what you pay for.
||Page 1 of 47