Information Security



Stop hacking of access control ­systems
March 2019, Editor's Choice, Access Control & Identity Management
Think someone hacking your access control system not a big deal? Scott Lindley suggests that you think again.

Read more...
New cybersecurity pavilion for Securex 2019
March 2019, Securex South Africa , Editor's Choice, News & Events, Conferences & Events, Training & Education
Securex South Africa 2019 has announced that 4Sight Technologies, a subsidiary of an international holdings company focusing on investing in Industry 4.0 companies, has signed on as the official sponsor ...

Read more...
Security by design
March 2019, Johnson Controls, Integrated Solutions
The security of the platforms on which physical security products are built will increasingly impact purchase decisions and market positions.

Read more...
A logical solution for cyber solutions
March 2019, Suprema, Access Control & Identity Management, Products & Solutions
BioMini Slim 2 is a thin, FBI PIV and FBI Mobile ID certified FAP20 optical scanner with a large platen for easy capturing of fingerprints.

Read more...
Managed IT security solution
March 2019, Infrastructure, Products & Solutions
The LanDynamix fully managed IT security stack ensures that all the main attack vectors typically used by hackers to breach a network are protected and proactively monitored.

Read more...
Top five security trends to look out for in 2019
March 2019, Genetec, Surveillance
From the continued focus on cybersecurity to the acquisition of global players, Genetec highlights the top five security trends to look forward to in 2019.

Read more...
Cyber Risk 101
March 2019
What every business needs to know about protecting themselves in case of a cyber-attack.

Read more...
Securing IoT, step by step
March 2019, Infrastructure
Kaspersky Lab joins forces with industry leaders to deliver actionable technical guidance for multiple IoT stakeholders.

Read more...
ESET launches a new blog aimed at insecure Android apps
March 2019
Insecure apps are much harder to identify and protect, while being no less of a threat.

Read more...
How to spot if your password was stolen in a security breach
1 March 2019
This article will tell you how to find out if your email address or password has been stolen and to check if passwords you are choosing are secure or not.

Read more...
The legalities of the digital signature
1 March 2019, Editor's Choice, Security Services & Risk Management
Electronic signatures and digital signatures differ significantly; it is critical that organisations recognise the legal implications of the electronic signature and the risk of fraud.

Read more...
How quickly could a cyber-attack take down critical infrastructure?
1 March 2019
With crucial national infrastructure like power systems and manufacturing currently in the spotlight, stakeholders need to consider the impacts of unseen risks, such as cyber-attacks, on operational technology networks.

Read more...
Security and cloud computing
1 March 2019, Integrated Solutions
Improving security is a strong motivation to accelerate the move from traditional IT architectures to modern, cloud ones.

Read more...
Cybersecurity is not enough
1 March 2019
Dallmeier presents the components for a total security approach in video technology.

Read more...
Insiders and personal data fraud
1 March 2019, Security Services & Risk Management
Our passport data, payment details, home addresses and e-mail addresses, phone numbers are stored in databases of more than a dozen institutions.

Read more...
2019 cybersecurity crystal ball
February 2019, Wolfpack Information Risk, Editor's Choice
Craig Rosewarne, MD of Wolfpack Information Risk says the cyber landscape will be more volatile and dangerous in 2019, are we ready?

Read more...
50% of companies can’t detect IoT breaches
1 February 2019, Editor's Choice, Infrastructure
Only around half (48%) of businesses can detect if any of their IoT devices suffer a breach. This comes despite an increased focus on IoT security.

Read more...
Data security sits at the heart of democracy
1 February 2019, Security Services & Risk Management
A succession of high-profile government data breaches both locally and abroad has cast a stark light on the importance of effective public sector cybersecurity policies and protections.

Read more...
Corporate fraud and insider threats
1 February 2019, Security Services & Risk Management
Insider fraud and theft can often be more damaging to a company than risks from outside.

Read more...
Corporate privacy in a selfie age
1 February 2019, Security Services & Risk Management
Doros Hadjizenonos, regional sales director at Fortinet in South Africa looks at how CISOs can maintain corporate privacy even as employees adopt emerging technologies.

Read more...



<< First   < Previous   Page 36 of 86   Next >   Last >>








While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.