Information Security



Threats spread to IM, collaboration tools
September 2019, Residential Estate (Industry)
The average office worker now spends up to 80% of their time using collaboration tools, but many lack adequate security.

Read more...
Becoming more cyber-savvy within the OT environment
September 2019, Industrial (Industry)
Organisations running operational technology (OT) have increasingly come under cyberattack, with malware sending shockwaves through these sectors.

Read more...
Cybersecurity requires a new approach
September 2019
From digital transformation through to the arrival of the Fourth Industrial Revolution (4IR), decision-makers are changing their views on how technology can benefit the organisation.

Read more...
The dark side of apps
1 September 2019, Kaspersky
In 2019 the number of worldwide mobile phone users is forecast to reach 4.68 billion, of which 2.7 billion are smartphone users.

Read more...
Does your digital life need a spring clean?
1 September 2019
With the right information, cybercriminals can easily gain access to private aspects of your life and exploit that for monetary gain.

Read more...
Cybersecurity for video surveillance systems
1 September 2019, Surveillance
Video surveillance systems are increasingly accessible over any IP network, which has led to the rise of potential cyberattack.

Read more...
The bi-directional cloud highway
1 September 2019, Editor's Choice, Integrated Solutions
Of the 350 companies surveyed, 74% had moved an application into the public cloud, and then for a variety of reasons and circumstances, decided to move it back.

Read more...
Patient critical – healthcare’s cybersecurity pulse
August 2019, Wolfpack Information Risk, News & Events, Healthcare (Industry)
The healthcare industry has become one of the leading cybersecurity attack vectors worldwide for several reasons.

Read more...
Cyber tools and solutions
August 2019, Technews Publishing, Editor's Choice, Infrastructure, Residential Estate (Industry)
Hi-Tech Security Solutions looks at the various options we have when it comes to protecting yourself from the ever-growing scourge of cybercrime?

Read more...
Understanding the data protection requirements and how to comply for POPI or GDPR
1 August 2019, Security Services & Risk Management
For many companies that must comply with these legislations, the best way to prepare is to implement a solid data protection strategy that guards against loss of data.

Read more...
Going safely into the brave new world of 4IR
1 August 2019, Industrial (Industry)
Put cybersecurity at the heart of industrial digitisation on the journey to 4IR.

Read more...
It’s not wise to go SIEMless
1 August 2019, Security Services & Risk Management
As with every other aspect of security today, information security, while the popular child in a dysfunctional family, is no longer enough.

Read more...
A one-size-fits-all approach won’t secure the IoT
1 August 2019, News & Events
Securing the Internet of Things (IoT) is something which cannot be done with a one-size-fits-all approach, and every kind of connected object must be assessed individually.

Read more...
Cloud advantage or cost?
1 August 2019, Infrastructure
No matter how you look at it, security in the cloud is as important as security in traditional data centres.

Read more...
AI-based malware detection
1 August 2019, Perimeter Security, Alarms & Intruder Detection
Check Point Software introduces Malware DNA, a new artificial intelligence-based malware detection engine to accelerate zero-day threat prevention.

Read more...
Building a human firewall
1 August 2019, Kaspersky, Training & Education
Riaan Badenhorst, general manager of Kaspersky in Africa answers some questions on the role of people in cybersecurity risks.

Read more...
Are your passwords stored securely?
1 August 2019
The number of users targeted by password stealers peaked from less than 600 000 in the first half of 2018 to over 940 000 during the same period in 2019.

Read more...
Trend Micro appoints Westcon-Comstor as VAD
1 August 2019, News & Events
Partnership to grow South African channel reach, develop channel competencies, unlock end-user value in the channel and create a wider distribution footprint across the continent

Read more...
360-degree approach is key
1 August 2019
When it comes to presenting a tempting attack surface for cyber criminals, all businesses are at risk, regardless of their size, popularity or how much they make.

Read more...
Inundated with cyberattacks from all directions
Residential Estate Security Handbook 2019, Editor's Choice, Security Services & Risk Management
IT managers are inundated with cyberattacks coming from all directions and are struggling to keep up due to a lack of security expertise, budget and up-to-date technology.

Read more...



<< First   < Previous   Page 34 of 87   Next >   Last >>








While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.