classic | mobile
Follow us on:
Follow us on Facebook  Share via Twitter  Share via LinkedIn

Hi-Tech Security Solutions Business Directory

Cyber Security

Control your own privacy
November 2016, Technews Publishing

Whether you know it or not, or whether you care or not, everything you do online is being tracked. TrackOFF protects you digital identity from fingerprinting and other nefarious online spies.

The app effect on security
November 2016

While security teams focus on patching operating systems and web browsers, vulnerabilities in those two types of software typically account for a small amount of publicly disclosed vulnerabilities.

Datacentrix revamps Security Operations Centre
November 2016, News, Security Services & Risk Management

Datacentrix, a provider of high performing and secure ICT solutions, has officially launched its overhauled Security Operations Centre (SOC), unveiling a highly intelligent service that provides actionable information to help organisations respond to attacks faster and more efficiently.

IT security drives business growth
November 2016, This Week's Editor's Pick, Access Control & Identity Management

South African businesses highlight a 30% percent increase in revenue from new business, while almost three-quarters agree identity-centric security is critical to the business.

King IV looks at your data
November 2016, J2 Software, Security Services & Risk Management

The launch of the King IV Report on Corporate Governance by the Institute of Directors in Southern Africa on 1 November provides a wake-up call for South African organisations.

Accessing cyber security
November 2016, Tyco Security Products, This Week's Editor's Pick, Access Control & Identity Management, Security Services & Risk Management

Tyco Security Products is taking a proactive role in securing its range of physical security products by developing its Cyber Protection Programme.

Multi-modal security best for registered financial service providers
October 2016, Technews Publishing, This Week's Editor's Pick, CCTV, Surveillance & Remote Monitoring, Access Control & Identity Management, Integrated Solutions, Financial (Industry)

The financial sector faces a number of security challenges that range from outright banking hall robberies, through theft of money at ATMs, internal and external fraud, as well as phishing and similar cyber threats.

After the data breach
October 2016, This Week's Editor's Pick, Security Services & Risk Management, Financial (Industry)

Lifars and Fortress Strategic Communications outline steps companies need to take after they contain the data breach and initiate the process of normalising business operations.

Biometric skimmers are here
October 2016, News

According to a Kaspersky Lab investigation into underground cybercrime, there are already at least twelve sellers offering skimmers capable of stealing victims’ fingerprints.

Great cyber security needs great people
October 2016, This Week's Editor's Pick, IT infrastructure, Training, Conferences & Events

Solutions are not reaching their full potential thanks to a dire shortage of cyber security professionals to harness them.

Tyco strengthens reader-to-panel communications
October 2016, Tyco Security Products, Access Control & Identity Management

C•CURE 9000 v2.50 event management platform now supports Open Supervised Device Protocol (OSDP), developed by the Security Industry Association (SIA) to allow for enhanced interoperability among security devices.

New Milestone VMS
October 2016, Milestone Systems, CCTV, Surveillance & Remote Monitoring, Integrated Solutions, Products

Milestone XProtect 2016 R3 Advanced VMS announced with focus on total cost of ownership, performance and cyber security – making video solutions more cost-effective through innovative new features.

Social media: help or hindrance?
October 2016, ADT Security, Security Services & Risk Management

The proliferation of social media platforms must be seen as an advantage when it comes to crime prevention.

Are you a whale?
October 2016, IT infrastructure

Whaling attacks, also called Business Email Compromise, is a form of elaborate spear phishing, usually targeting C-level executives, i.e. the ‘big fish’.

Page 1 of 44 Next > Last >>

Technews Publishing (Pty) Ltd
1st Floor, Stabilitas House
265 Kent Ave, Randburg, 2194
South Africa
Publications by Technews
Dataweek Electronics & Communications Technology
Electronic Buyers Guide (EBG)

Hi-Tech Security Solutions
Hi-Tech Security Business Directory (HSBD)

Motion Control in Southern Africa
Motion Control Buyers’ Guide (MCBG)

South African Instrumentation & Control
South African Instrumentation & Control Buyers’ Guide (IBG)
Terms & conditions of use, including privacy policy
PAIA Manual
    Mobile | Classic

Copyright © Technews Publishing (Pty) Ltd. All rights reserved.