Information Security



Bringing mobility into business
August 2012
The proliferation of Apple iOS and Android based mobile computing devices is significant, not only in the consumer space, but also in the office. People are quick to gravitate to the ease of use, increased mobility and portability with access to applications anywhere any time.

Read more...
Beyond signatures and behavioural heuristics
August 2012, Products & Solutions
Over 95% of businesses unknowingly host compromised endpoints, despite their use of traditional and next-generation firewalls, intrusion prevention systems (IPS), antivirus and web gateways.

Read more...
Security updates. Who cares?
1 August 2012
25% of adults don’t clearly understand what software updates do. The solution lies in developing security systems that are as transparent as possible to use, and ensuring those solutions are as easy to use as possible.

Read more...
It is the data, not the device
1 August 2012
The IT manager has the opportunity to redefine his/her role as the custodian of corporate data, managing information not devices. It is this shift in focus to managing data rather than devices that turns a headache into an opportunity.

Read more...
The genesis of privileged identity
1 August 2012
Whether someone starts with a server or a workstation, creates on-premise solutions for their network infrastructure or builds out a cloud, they’ll always have to start out with an account with God-like power that will control all other accounts accessing that resource going forward in the future.

Read more...
The case for mobile device management
July 2012
Companies need a solid mobile device management strategy if they are to effectively and safely unlock the opportunities of an increasingly mobile workforce.

Read more...
Are you human?
July 2012
Anti-automation solutions help prevent computer-assisted tools and crowd sourcing from bypassing anti-spam services.

Read more...
Protect your data with IAM
July 2012, Access Control & Identity Management
Prevent fraud, comply with POPI and protect your data inside and out with identity and access management.

Read more...
Security perception vs reality
June 2012
‘State of Security’ report shows organisations recognise a pervasiveness and resiliency of cyber criminals’ yet 79% experienced a significant incident in past 12 months.

Read more...
Protect your Android
June 2012
Kaspersky Lab’s new tablet security solution provides effective protection from malware, secures the user online experience and keeps your personal data safe, even if the device is lost or stolen.

Read more...
It is what is inside
1 June 2012
An unsettling comment in the CSFI report states, “We have seen an alarming shift in the perpetrator profile towards senior management. This is also reflected in the types of economic crime that are being committed.”

Read more...
How safe are your mobile banking apps?
1 June 2012
25% of the mobile banking apps tested didn’t provide adequate security: passwords, partial credit card details, payment history and transaction details were easily retrieved from the handset. What’s more, another 31% of banking apps had less severe security issues with 44% offering adequate security.

Read more...
New backup option
1 June 2012
Symantec declares better backup for all sized organisations and calls for 80 percent reduction in operating costs. New survey data reveals that the current approach to backup modernisation is broken.

Read more...
E-mail plug-in boosts continuity
1 June 2012
Securicom has boosted its e-mail archiving and business continuity solution, MailVault, with a plug in that integrates with corporate e-mail clients and allows users to continue accessing and working with e-mails, using their usual e-mail interface, even when the server is down.

Read more...
Security begins with the basics
April 2012, Technews Publishing, Infrastructure
Whether your infrastructure is designed to support data, security or anything else, IP technology is under attack and you need to ensure it is protected to facilitate streamlined business and security operations.

Read more...
Data security is not optional
April 2012, Technews Publishing
Anyone who is not worried about the security of their data, be it personal information, contact databases or intellectual property, simply has not been paying attention.

Read more...
The RSA Security breach
April 2012
The sophisticated multi-pronged attack that struck RSA Security last March has resulted in the high profile IT security vendor overhauling the manufacturing and distribution of its SecurID tokens.

Read more...
Securing IT systems
April 2012, Fourier IT Innovation
Big access control vulnerabilities mean big opportunities in 2012.

Read more...
E-mail protection
April 2012
Loophold delivers Barracuda technology with reach inside the network perimeter for AV protection on MS Exchange: includes anti-virus agent that runs on Exchange servers and expanded encryption capabilities.

Read more...
More than backup
April 2012
Seamless and cost effective data protection solutions.

Read more...



<< First   < Previous   Page 53 of 80   Next >   Last >>