|Control your own privacy
November 2016, Technews Publishing
Whether you know it or not, or whether you care or not, everything you do online is being tracked. TrackOFF protects you digital identity from fingerprinting and other nefarious online spies.
|The app effect on security
While security teams focus on patching operating systems and web browsers, vulnerabilities in those two types of software typically account for a small amount of publicly disclosed vulnerabilities.
|Datacentrix revamps Security Operations Centre
November 2016, News, Security Services & Risk Management
Datacentrix, a provider of high performing and secure ICT solutions, has officially launched its overhauled Security Operations Centre (SOC), unveiling a highly intelligent service that provides actionable information to help organisations respond to attacks faster and more efficiently.
|IT security drives business growth
November 2016, This Week's Editor's Pick, Access Control & Identity Management
South African businesses highlight a 30% percent increase in revenue from new business, while almost three-quarters agree identity-centric security is critical to the business.
|King IV looks at your data
November 2016, J2 Software, Security Services & Risk Management
The launch of the King IV Report on Corporate Governance by the Institute of Directors in Southern Africa on 1 November provides a wake-up call for South African organisations.
|Accessing cyber security
November 2016, Tyco Security Products, This Week's Editor's Pick, Access Control & Identity Management, Security Services & Risk Management
Tyco Security Products is taking a proactive role in securing its range of physical security products by developing its Cyber Protection Programme.
|Multi-modal security best for registered financial service providers
October 2016, Technews Publishing, This Week's Editor's Pick, CCTV, Surveillance & Remote Monitoring, Access Control & Identity Management, Integrated Solutions, Financial (Industry)
The financial sector faces a number of security challenges that range from outright banking hall robberies, through theft of money at ATMs, internal and external fraud, as well as phishing and similar cyber threats.
|After the data breach
October 2016, This Week's Editor's Pick, Security Services & Risk Management, Financial (Industry)
Lifars and Fortress Strategic Communications outline steps companies need to take after they contain the data breach and initiate the process of normalising business operations.
|Biometric skimmers are here
October 2016, News
According to a Kaspersky Lab investigation into underground cybercrime, there are already at least twelve sellers offering skimmers capable of stealing victims’ fingerprints.
|Great cyber security needs great people
October 2016, This Week's Editor's Pick, IT infrastructure, Training, Conferences & Events
Solutions are not reaching their full potential thanks to a dire shortage of cyber security professionals to harness them.
|Tyco strengthens reader-to-panel communications
October 2016, Tyco Security Products, Access Control & Identity Management
C•CURE 9000 v2.50 event management platform now supports Open Supervised Device Protocol (OSDP), developed by the Security Industry Association (SIA) to allow for enhanced interoperability among security devices.
|New Milestone VMS
October 2016, Milestone Systems, CCTV, Surveillance & Remote Monitoring, Integrated Solutions, Products
Milestone XProtect 2016 R3 Advanced VMS announced with focus on total cost of ownership, performance and cyber security – making video solutions more cost-effective through innovative new features.
|Social media: help or hindrance?
October 2016, ADT Security, Security Services & Risk Management
The proliferation of social media platforms must be seen as an advantage when it comes to crime prevention.
|Are you a whale?
October 2016, IT infrastructure
Whaling attacks, also called Business Email Compromise, is a form of elaborate spear phishing, usually targeting C-level executives, i.e. the ‘big fish’.
||Page 1 of 44