Information Security



From physical security to cybersecurity
Access & Identity Management Handbook 2020, Genetec, Security Services & Risk Management
Genetec discusses the security-of-security concept as a means to protect cameras, door controllers and other physical security devices and systems against cybercriminal activity.

Read more...
Minding the gaps to protect industrial PLCs from cyber threats
1 January 2020, AVeS Cyber Security
PLCs, designed to control machinery and specific processes, were never built with cybersecurity threats in mind and protecting PLCs against these threats requires healthy isolation from the Internet.

Read more...
Cyber attackers’ focus on South African businesses
1 January 2020
Ransomware industry flourishes in SA while businesses are largely unprepared for the business interruption and financial fallout of a breach.

Read more...
2020 cybersecurity predictions
1 January 2020, Security Services & Risk Management
KnowBe4 has compiled a list of its top 10 cybersecurity predictions for 2020 from its executive leadership team and array of security awareness advocates from around the world.

Read more...
The quest for biometric data
1 January 2020, Kaspersky
One-in-three computers processing biometric data faced attempts to steal data or take remote control of the devices in the third quarter of 2019.

Read more...
African trust centre launches cyber division
November 2019
Advancing cybersecurity to more stringent heights, LAWtrust has launched a new division focusing on cybersecurity services to complement its identity, encryption and digital signature offerings.

Read more...
What are the cybersecurity issues in video surveillance?
November 2019, Axis Communications SA, Editor's Choice, Surveillance
he importance of the data captured by surveillance cameras – and what can be done with it – has led to a new breed of cybercriminals, looking for insights to steal and sell.

Read more...
Protecting the outer perimeter with cloud services
1 November 2019
Business leaders now have a choice whether they want to continue using their trusted firewall or move to a next-generation firewall delivered by appliances or as cloud services.

Read more...
Information security outsourcing service
1 November 2019
SearchInform launches information security outsourcing service for companies that face the problem of corporate fraud and data leakage.

Read more...
Block threats before they target your business
1 November 2019
The antivirus solutions of a decade ago are woefully inadequate weapons in the fight against today’s complex threats.

Read more...
Encrypted communication in compact cellphone format
1 November 2019
embedded brains develops hardware, mechanical components and power management strategy for plug-and-play personal security device genucard 3.

Read more...
Trend Micro launches Cloud One
1 November 2019
Trend Micro announced the launch of Trend Micro Cloud One, a security services platform for organisations building applications in the cloud.

Read more...
More complex and challenging
1 November 2019
The rate at which digital technology is evolving and disrupting traditional business models is frightening, yet cyber risks seem to evolve even faster.

Read more...
Making a case for OT cybersecurity investment
1 November 2019
OT in most traditional heavy industries and infrastructure facilities have been run in silos behind ‘air gaps’ for so long that the board assumes they are safe from attack.

Read more...
Connected cars, cloud and cybersecurity
1 November 2019
Cybersecurity is important when developing safety-focused autonomous cars. Each vehicle becomes a new endpoint which must be secured.

Read more...
Keeping your things to yourself
October 2019, Technews Publishing, Editor's Choice, Integrated Solutions, Infrastructure
Three experts spoke to Hi-Tech Security Solutions to offer advice on keeping your IoT working for you and not for cyber criminals.

Read more...
IoT in security
October 2019, Duxbury Networking, Technews Publishing, Editor's Choice, Integrated Solutions, Infrastructure
Using the Internet of Things is not really optional these days, but securing the Internet of Things is compulsory, no matter what industry you operate in.

Read more...
Your business needs synchronised security
1 October 2019, Products & Solutions
This complete security portfolio from Sophos offers endpoint, servers, firewall, Wi-Fi, mobile, email and encryption that is fully scalable to grow as your business does.

Read more...
NFa2p security certification
October 2019, News & Events
Advisor Advanced obtains the highest level of certification to the NFa2p Electronic Security Standard for a complete security system.

Read more...
SOAR an essential part for security operations
October 2019, Editor's Choice, Security Services & Risk Management
MJ Strydom, MD of cybersecurity specialist company DRS discusses the challenges around the security incident response lifecycle.

Read more...



<< First   < Previous   Page 30 of 85   Next >   Last >>








While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.