Information Security



Is your CCTV system secure from cyber attack?
CCTV Handbook 2016, Surveillance, Editor's Choice
Visual surveillance is more integral to society than ever before, helping organisations to safeguard their most valuable assets. However, the DVR systems traditionally employed in CCTV networks can make those very organisations vulnerable.

Read more...
Privacy and visitor management
April 2016, Impro Technologies, Ideco Biometrics, Editor's Choice, Access Control & Identity Management, Integrated Solutions, Infrastructure
The right to privacy and the guarantee thereof is becoming more important in visitor management, and penalties for neglecting this issue will soon be enforceable.

Read more...
Digitally transforming identity ­relationships
April 2016, Editor's Choice, Access Control & Identity Management
A reliable digital identity determines the success of corporate digital transformation projects.

Read more...
Fortinet strengthens African presence
April 2016, News & Events
Fortinet has further invested in the African market through the appointments of three new members.

Read more...
Integrated security key
April 2016, Editor's Choice
South African companies need to automate and integrate their IT security solutions to meet increasingly sophisticated threats, writes Intel Security’s Trevor Coetzee.

Read more...
Why your cloud app should be SAML-enabled
April 2016
David Meyer, VP of product at OneLogin discusses the benefits of SAML (Security Assertion Markup Language).

Read more...
Technology is not a silver bullet
April 2016
Cyber security is no longer an IT problem but rather an organisational priority. Unfortunately, there is no silver bullet against cyber onslaughts and implementing the right technology won’t cut it.

Read more...
Service provider got you hacked?
April 2016, Tyco Security Products - Johnson Controls
Have you ever asked if your security system provider is protecting your data from cyber attacks?

Read more...
Containing cyber security risks
1 April 2016, Conferences & Events
The most important cost of cybercrime comes from its damage to company performance and to national economies. Cybercrime damages trade, competitiveness, innovation, and global economic growth.

Read more...
Is security the missing link?
1 April 2016
The World Economic Forum (WEF) expects the Internet of Things (IoT) to eliminate more than 50 million jobs in the next five years as technology automates more day-to-day tasks.

Read more...
When, not if
March 2016, Editor's Choice, Security Services & Risk Management
What is one of the top worries of C-suite executives these days? Whether or not their company can survive a database breach.

Read more...
Uber accounts for sale
1 March 2016, News & Events
Trend Micro found that Uber accounts are worth more on the Deep Web than stolen credit card information.

Read more...
TFG upgrades identity ­management
March 2016, Retail (Industry), Access Control & Identity Management
Leading SA retailer enhances competitiveness through deployment of CA Technologies’ security solution, expects to reduce costs and improve business efficiencies while streamlining compliance.

Read more...
Data centre security
March 2016, Access Control & Identity Management
Key management systems offer proactive approach to data centre security.

Read more...
Cyber security outlook
February 2016, Technews Publishing, Editor's Choice
Hi-Tech Security Solutions takes a brief look at what’s happening in the world of ­cyber security going into 2016.

Read more...
It’s not you, it’s me
February 2016
Despite the rapid growth of cloud services, security is still the number one concern for business owners migrating their workloads to the cloud.

Read more...
Integrated technology critical to success
February 2016, Integrated Solutions
While various technologies continue to evolve and are being implemented today, the real impact will only be seen when analytics allow them to be combined in real-time, with some artificial intelligence behind it.

Read more...
Mobile app survey
February 2016
In November 2015, Arxan commissioned a survey on the security of mobile apps widely available in the market today. These are the results.

Read more...
Cloud-based IAM solution
February 2016, News & Events
OneLogin enhances its cloud-based IAM solution for enterprises with hybrid on-premise and cloud environments through acquisition of Cafésoft.

Read more...
Smart cities will use 1.6 billion connected things in 2016
February 2016, News & Events
Gartner, Inc. estimates that 1.6 billion connected things will be used by smart cities in 2016, an increase of 39% from 2015 (see Table 1).    “Smart commercial buildings will be the highest user of Internet ...

Read more...



<< First   < Previous   Page 44 of 80   Next >   Last >>