Information Security



Cisco 2015 Midyear Security Report
1 October 2015, Integrated Solutions
Cisco midyear security report highlights need for organisations in South Africa to invest in integrated technologies to reduce time to detection and remediation to a matter of hours amid a spate of sophisticated cyber attacks.

Read more...
Passport to identity crisis
September 2015, iFacts, Editor's Choice, Access Control & Identity Management, News & Events
Scores of South Africans woke up to a disturbing reality recently when the British High Commission contacted them to say that their UK Visa Applications, together with all supporting documentation, had ...

Read more...
Cloud-based identity management solution
September 2015, Access Control & Identity Management, Integrated Solutions
Networks Unlimited has introduced Centrify Privilege Service (CPS), a cloud-based identity management solution that addresses today’s growing gap in security, visibility and control over privileged accounts, ...

Read more...
Wireless the weakest security link
1 September 2015
The wireless network is the weakest security link in enterprise IT infrastructure. Nine in 10 CIOs report concerns over insufficient wireless protection; over one-third of enterprises found lacking basic wireless security.

Read more...
Protect your scada systems
1 September 2015, Industrial (Industry)
Check Point delivers scada security solutions to protect industrial control systems against cyber threats. New hardened security appliance with scada security for critical infrastructure.

Read more...
Stopping the next cyber attack
August 2015, Infrastructure
Doros Hadjizenonos, country manager of Check Point South Africa, explains how organisations can mitigate threats and how SA compares to the rest of Africa when it comes to cyber crime.

Read more...
18% of South Africans lost ­backup copies
August 2015, Infrastructure
A joint survey by Kaspersky Lab and B2B International has found that 18% of South African users surveyed who kept backup copies of their data on physical media eventually lost these copies.

Read more...
BlackBerry acquiring AtHoc
1 August 2015, News & Events
BlackBerry and AtHoc to connect communities, devices and organisations for real time communication.

Read more...
Surveillance systems under attack
1 July 2015
Security examination of a working city video surveillance system by Kaspersky Lab has revealed that networks designed to help protect people from criminals and terrorists could be misused by a third party exploiting system configuration flaws.

Read more...
Hosted security services
1 July 2015, Security Services & Risk Management
Cloud services can be useful, cost effective and beneficial, but take care of your security first. Michael Horn, BU manager for security at CA Southern Africa elaborates on being secure out in the great wide Internet.

Read more...
Complete solution for three KZN schools
July 2015, MiRO, Surveillance
Three KZN schools opt for wireless networks for Internet access and security surveillance.

Read more...
The increasing pace of technology advancement
June 2015, News & Events, Editor's Choice
The trouble with thinking about technology advancements is that the rate of past progress does not predict the rate of future progress.

Read more...
Layered approach to prevent watering hole attacks
1 June 2015
A layered approach based on a combination of checks and balances, along with various key technologies, is the most comprehensive method of preventing so-called watering hole malware attacks.

Read more...
Mobile content security and enterprise collaboration boosted
1 June 2015, Integrated Solutions
BlackBerry announced that it has entered into a definitive agreement to acquire WatchDox to further enhance its mobile security and give enterprises control over their files even after data leaves the corporate network.

Read more...
Driving PSIM through true SOA
1 June 2015, Surveillance
In any PSIM deployment, the day-to-day information load is relatively minimal. The challenge is the response to a sudden surge in this load, caused by a critical event or disaster scenario, comprised of multiple events happening at the same time.

Read more...
Stopping the leak
May 2015
The damage that data loss can do to an inadequately secured enterprise extends far beyond pecuniary matters and can include reputation loss, regulatory consequences, a decrease in customer confidence, trust issues, a drop in market share, and the development of trade barriers.

Read more...
Cyber risks severely underrated
1 May 2015, Integrated Solutions
South Africa is the fifth most targeted country in the world in terms of cybercrime attacks, while informal consensus within the private sector places SA third behind Russia and China.

Read more...
Detection and response
1 May 2015
Recent large-scale attacks move focus from blocking and detecting attacks, to detecting and responding to attacks. Gartner says by 2018, 40% of large organisations will have formal plans to address aggressive cyber-security business disruption attacks.

Read more...
Data security is essential for Government
May 2015, Government and Parastatal (Industry)
Cybercrime is a burgeoning threat, not only to business but also to governments all over the world. The increasing number of highly publicised examples of cybercrime highlights this trend.

Read more...
Anticipate, adapt, activate
April 2015
Annual global EY survey finds organisations are still unprepared for inevitable cyber attacks.

Read more...



<< First   < Previous   Page 46 of 80   Next >   Last >>