Information Security



Security in the cloud
1 July 2014
Panda Security has announced the availability of its new cloud offering, Panda Cloud Fusion, which combines comprehensive security, management and support in one solution.

Read more...
How hackers are stealing ­company secrets
1 July 2014, Security Services & Risk Management
Common, everyday applications Facebook, YouTube, Flickr etc. can be used to transfer sensitive data out of your organisation with ease.

Read more...
POPI demands control over mobile data
1 July 2014
The Protection of Personal Information Act (POPI) should prompt a mobile security rethink for SA companies.

Read more...
Securing mobile communication services
1 July 2014
A new player is entering the market, offering the solution to mobile security concerns.

Read more...
Patience is a criminal virtue
1 June 2014
Symantec report reveals the number of mega data breaches went from one in 2012 to eight in 2013; 552 million identities exposed in 2013.

Read more...
Advanced evasion techniques prove costly
1 May 2014
Research commissioned by McAfee examines the role and cost of advanced evasion techniques in recent high profile data breaches.

Read more...
When, not if
1 May 2014
Cisco introduces Advanced Malware Protection to protect its 60 million enterprise and commercial users of Web, e-mail and cloud Web security solutions.

Read more...
On-premise security doesn’t make sense
1 May 2014
Though using separate best-of-breed, on-premise solutions for different security problems remains the dominant approach for deploying IT security, recent research by Osterman Research shows that companies would prefer a single or cloud-based approach.

Read more...
Effective website security
May 2014
Websites have been using SSL technology for years to ensure their security, and the certificates and their uses are well understood. SSL that only protects users at login, however, leaves them vulnerable when they’re spending time on your website.

Read more...
Keeping data secure
April 2014
With the ongoing trend to move data offsite on mobile devices, can we truly find ways of ensuring that this data is secure from prying hands and eyes? And is data security for mobile devices different from that for supposedly office- or home-bound data?

Read more...
Mobile security from the cloud
April 2014
Despite the widely publicised losses resulting from targeted attacks, many SMBs have not taken action to address mobile device security. Research Now found that fewer than half of the enterprises surveyed had implemented a security solution.

Read more...
Cybersecurity in The Surveillance Age
April 2014
Strong encryption guards against data integrity compromises, which are typically treated by network engineers or mobile security experts as hostile and untrustworthy.

Read more...
New Titanium Backup Appliance
April 2014
Attix5, a data protection software and cloud solution provider, has announced the release of the Titanium Appliance, a complete onsite backup and recovery solution preinstalled with Attix5 software.

Read more...
Protecting critical data
April 2014
Quartile Capital ensures sensitive client information is encrypted and secured, by unifying data protection and backup across physical and virtual environments.

Read more...
POPI is here: start getting compliant
April 2014
E-mail security, archiving, and data loss prevention should be high on the agenda for South African companies in 2014 with PoPI around the corner.

Read more...
Over the NSA spying hype? Don’t be
April 2014
Hybrid cloud solutions – a mix of the best services provided by an outside environment and an internal infrastructure – are the latest buzzword. But even as they are touted as a ‘best of both worlds’ solution, they come with their own concerns.

Read more...
What’s inside Pandora’s box?
April 2014, iFacts
Cybercrime doesn’t just happen to large corporations. Small businesses are increasingly becoming prey for hackers, espionage, online fraud and social engineering. It is a growing and pervasive plague across the world.

Read more...
Keep control over your data
March 2014
Safesync provides enhanced data protection features such as DLP, persistent file encryption and document tagging, and is touted as a secure alternative to cloud based file sharing solutions such as DropBox.

Read more...
Costly content at risk
March 2014
The average cost of multimedia files that a user might lose from a device as a result of a cyber attack or other damage is estimated at $418, according to a Consumer Security Risks Survey, conducted by B2B International and Kaspersky Lab.

Read more...
Don’t be a hostage to ransomware
February 2014
Latest-generation ransomware can permanently encrypt business files, unless you pay to free them. Doros Hadjizenonos, sales manager at Check Point South Africa, takes a look at how ransomware is on the rise, and how firms can defend their data against being taken hostage.

Read more...



<< First   < Previous   Page 48 of 80   Next >   Last >>