Information Security



Ransomware loves retail
Issue 7 2022, Retail (Industry)
The retail industry was the second most targeted industry by ransomware in 2021, with 77% of retail organisations hit with ransomware, a 75% rise from 2020.

Read more...
Moore’s Law, sustainability and data centres
Issue 7 2022, Infrastructure
Despite a sixfold increase in the data being processed since 2010, data centre energy consumption only increased by 6% to 2018, says Natalya Makarochkina, senior vice president, Secure Power Division, International Operations, Schneider Electric.

Read more...
Cloud can cut your security risks
Issue 7 2022, Infrastructure
Todd Schoeman, BT client business director in South Africa, explores the ways that organisations can reduce security risk by using the cloud.

Read more...
Data recovery is key
Issue 6 2022, Infrastructure
As we become more firmly entrenched in the cloud, it is imperative to evaluate the measures that have been put into place to prevent an attack, but also the tools and protocols to help a business recover.

Read more...
Infinidat releases new enhancements
Issue 6 2022, Technews Publishing, News & Events, Infrastructure
Infinidat announced a series of significant enhancements to its InfiniBox and InfiniGuard platforms, expanding capabilities, guaranteed SLAs and capacity.

Read more...
Sophos MDR service compatible with third-party technologies
Issue 6 2022, Technews Publishing, News & Events
Integrates telemetry from third-party endpoint, firewall, cloud, identity, email and other security solutions with Sophos Adaptive Cybersecurity Ecosystem for improved threat detection and response.

Read more...
Digital security for the new entrepreneur
Issue 6 2022
As South Africa’s entrepreneurial spirit blossoms, digital security is more important than ever, warns Steve Flynn, sales and marketing director at ESET Southern Africa.

Read more...
The next step in an evolving security landscape
Issue 6 2022, DCC Techhnologies, Products & Solutions
The hybrid workplace continues to enjoy consistent adoption, particularly amongst those industries that do not require their workforce to be at the office every day, however, it has also brought with it a smorgasbord of security challenges.

Read more...
Cybersecurity for your SMME
Issue 6 2022
In SMMEs, where entrepreneurs and their staff often perform multiple functions, protecting individual and networked computers from attack can seem like an overwhelming task.

Read more...
Cyber resilience is more than cybersecurity
Issue 6 2022, Technews Publishing, Integrated Solutions, Infrastructure
Hi-Tech Security Solutions held a round-table discussion focusing on cyber resilience and found that while the resilience discipline includes cybersecurity, it also goes much further.

Read more...
Defining the resilience of cybersecurity
Issue 6 2022, Security Services & Risk Management
Cyber resilience is less buzzword and more critical business strategy as the cybercrime landscape grows in intent and intensity.

Read more...
How to stay cybersafe on business trips
Issue 5 2022
No matter where you are in the world, tech-savvy criminals are looking for ways to exploit email addresses, social media profiles, passwords, financial data and stored files.

Read more...
The challenge of data safety and availability
Issue 6 2022, Technews Publishing, Editor's Choice
Veeam offers backup and recovery software that presents the user with one interface to manage backups to and from almost any platform.

Read more...
How safe are your backups?
Issue 6 2022, Technews Publishing
Immutable backups prevent malware from compromising your data and ensure the right data is restored in an emergency when following a four-step backup process.

Read more...
Growing cyber resilience portfolio
Issue 6 2022, Technews Publishing, Security Services & Risk Management
Hi-Tech Security Solutions spoke to Richard Frost, who heads up Armata, to find out what the company offers in terms of cyber resilience.

Read more...
Adopting a cyber-secure mindset
Issue 5 2022, Security Services & Risk Management
Adopting a cybersecure mindset is the key to mitigating the risk of falling victim to the growing cybercrime pandemic.

Read more...
Advanced technologies to curb corruption
Issue 5 2022, News & Events, Infrastructure
The use of advanced technology to curb fraud, corruption and cyber-related crimes received a massive boost as the Council for Scientific and Industrial Research (CSIR) and Special Investigation Unit (SIU) agreed to work together.

Read more...
Reversing the hidden risk of permission creep
Issue 6 2022
Employees can collect a range of access rights to business systems throughout their tenure. It's a phenomenon called 'permission creep': one of the biggest cybersecurity risks for organisations today.

Read more...
Mitigating the risk of zero-day attacks against Microsoft 365
Issue 6 2022
Microsoft 365 servers contain extremely sensitive information and most organisations simply cannot do without it for an extended period of time.

Read more...
Is the public cloud secure?
Issue 6 2022, Security Services & Risk Management
Public providers spend a lot on security and specialise in security as a critical part of their business model, but there are risks in the public cloud that customer companies aren’t always aware of.

Read more...



<< First   < Previous   Page 15 of 85   Next >   Last >>








While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.