Information Security



Nclose moves to secure Microsoft 365 environment
Issue 8 2020, News & Events
Nclose has launched dedicated Microsoft 365 managed security services within its Managed Security Services division, to help enterprises with newly-remote workforces close gaps in their security environment.

Read more...
Detect dangerous insider activity
Issue 8 2020, Products & Solutions
Offering unique ‘Indicators of Intent’ capabilities, Intercept 6.0 empowers cybersecurity teams with contextual awareness of workforce activities without invading personal privacy.

Read more...
The arms race of AI in cybersecurity
CCTV Handbook 2020, Axis Communications SA
Cybersecurity goes further than network video and audio, but these are as likely to be targeted as much as any network-connected device.

Read more...
Exploiting the global pandemic
Issue 7 2020
Cyber criminals targeting remote work to gain access to enterprise networks and critical data reports FortiGuard Labs.

Read more...
Integrated security is key to Huawei Mobile Services
1 September 2020
To ensure sufficient mobile device security, the technology giant incorporates security into its chip, device and cloud capabilities.

Read more...
Cybersecurity becomes key enabler of sustainable business growth
1 September 2020
The adoption of rushed digital transformation strategies has left many facing unintended complexities and challenges.

Read more...
Africa under cyber-attack
1 September 2020, Kaspersky
Kaspersky has reported that South Africa, Kenya and Nigeria saw millions of cyber-attacks in 2020 and the year is not over yet.

Read more...
Five ways to strengthen information security while working remotely
1 September 2020
Organisations need to find new ways to ensure the security of endpoint devices and the data they contain, help their employees understand the risks and find solutions that adapt to their needs.

Read more...
Challenges healthcare is facing
1 August 2020
The healthcare industry has been forever changed by digital transformation, but cybercriminals are targeting the healthcare sector now more than ever.

Read more...
Secure IoT devices and networks
1 August 2020, Technews Publishing
Check Point Software’s IoT Protect solution secures IoT devices and networks against the most advanced cyber-attacks.

Read more...
SentinelOne Protects the AA
1 August 2020
National provider of 24-hour motorist assistance stays on the road thanks to accelerated, AI-powered threat prevention, detection and response.

Read more...
Protecting database information
1 August 2020
SearchInform has officially released Database Monitor, a solution for the protection of information stored in databases.

Read more...
Work from home securely
1 July 2020
First Consulting provides enterprise-level IT security to working-from-home employees at more than 40 South African organisations.

Read more...
Agility, meticulous alignment and testing
1 July 2020
Data loss can put the nails in the coffin for unprepared businesses. Investing in cyber resilience is key to succeed in the age of digital transformation.

Read more...
Cybersecurity comment: A holistic approach to threat vulnerability
Issue 5 2020
Any organisation, whether large or small, public or private, should follow an established framework in order to protect itself against cyber threats.

Read more...
Email security in COVID-19 times
Issue 5 2020
MJ Strydom, MD of cybersecurity specialist company, DRS, takes a look at email security in the era of COVID-19 and beyond.

Read more...
June 2020’s most wanted malware
Issue 5 2020
Check Point Research finds sharp increase in attacks using the Phorpiex Botnet delivering new ‘Avaddon’ ransomware via malspam campaigns.

Read more...
60% in SA victim to public cloud cybersecurity incidents
Issue 5 2020
Ransomware and malware, exposed data, compromised accounts, and cryptojacking to blame; GDPR shows promise with Europeans suffering least.

Read more...
Vodacom Business enhances cyber resilience
Issue 5 2020
Partnership with Cloudflare will allow Vodacom Business to offer DDoS protection and traffic acceleration for all network infrastructure — whether on-premise, cloud-hosted, or in a hybrid environment.

Read more...
Tax season often equals tax scams
Issue 5 2020
While many of us cannot wait for our refunds, this is also a time of the year when cybercriminals are waiting to attack.

Read more...



<< First   < Previous   Page 29 of 87   Next >   Last >>








While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.