Information Security



SME cybersecurity: high risk
1 February 2019, Infrastructure
Small and medium-sized businesses are becoming more attractive targets for cyber criminals – both direct and also as a starting point for larger attacks across a supply chain.

Read more...
Kaspersky unveils new partner programme
1 February 2019, Kaspersky, News & Events
Specialised, enabling and profitable: Kaspersky Lab unveils new programme to empower its partners and improve services to clients.

Read more...
Integration is communication
1 February 2019, AVeS Cyber Security, Integrated Solutions
Communication is the missing link for integrating physical and IT security resources, says Charl Ueckermann, CEO at AVeS Cyber Security.

Read more...
Attack of the thingbots
1 February 2019, Editor's Choice, Integrated Solutions
New F5 Labs research reveals IoT devices are now hackers’ No.1 target as multi-purpose attack thingbots loom large.

Read more...
IoT: The Good, the Bad, and the Ugly
1 February 2019, Integrated Solutions, Infrastructure
Like any great Western, IoT is the new technology frontier and it brings its own fair share of challenges to the saloon.

Read more...
Top password managers have fundamental flaws
1 February 2019
Top password managers have fundamental flaws that expose user credentials in computer memory while locked, according to new research.

Read more...
Fortinet secures the path to 5G
1 February 2019, Infrastructure
Fortinet Security Fabric delivers cloud-grade scalability, visibility, and control with carrier-grade performance and capacity to secure evolving 4G networks, IoT services and 5G mobility platforms.

Read more...
Business must do more to limit exposure of data in the cloud
1 February 2019, Infrastructure
Organisations should pay closer attention to security concerns associated with storing data in the cloud as configuration errors pose a risk to enterprise data.

Read more...
37% of organisations impacted by cryptomining
1 February 2019
New report shows 20% of companies globally continue to be hit by cryptomining attacks every week; 33% of companies were hit by mobile malware, and just 4% by ransomware in the past 12 months.

Read more...
Cybersecurity for beginners
1 February 2019
Seven tips to stay secure online in 2019.

Read more...
Managing who, what and why
Access & Identity Management Handbook 2019, Technews Publishing, Editor's Choice
Today’s access control isn’t only concerned with who has access, but also what has access, why they need it and what they are doing with it.

Read more...
Physical/logical convergence
Access & Identity Management Handbook 2019, Technews Publishing, Editor's Choice, Integrated Solutions, Infrastructure
The convergence between physical and logical (or cyber) security will be a game-changer because it will change the way we do everything, from planning to design and all the way to installation and maintenance.

Read more...
Using tomorrow’s tools to solve ­today’s security problems
Access & Identity Management Handbook 2019, Access Control & Identity Management, Integrated Solutions
It is the companies that are already investing in tomorrow’s tools to solve today’s problems that will survive the ongoing onslaught to circumvent security solutions.

Read more...
NEC XON talks Industry 4.0 and disruption
November 2018, Technews Publishing, Editor's Choice, Integrated Solutions, Conferences & Events, Training & Education
NEC XON held its seventh annual summit at Sun City in October this year in which it focused on the Fourth Industrial Revolution (IR4) and how it would disrupt the status quo.

Read more...
Our dependence on cyber-connectivity
November 2018, Wolfpack Information Risk, Editor's Choice, Government and Parastatal (Industry)
The health, safety, security, economic well-being of citizens, effective functioning of government and perhaps even the survival of the industrialised world relies heavily upon interconnected critical systems.

Read more...
How close has video analytics grown to AI?
November 2018, Technews Publishing, Surveillance, Integrated Solutions
Hi-Tech Security Solutions asks how far artificial intelligence has changed the video analytics market and how it will make an impact in future.

Read more...
Digital forensics is crucial to the security chain
1 November 2018
Forensics involves the application of forensic tools to recover, scrutinise and analyse masses of data and logs to uncover what has happened.

Read more...
The risks of social media
1 November 2018, AVeS Cyber Security
Employees, their social media profiles and the devices they use to access a company’s network and resources provide a plethora of gateways into the infrastructure for cyber criminals.

Read more...
The need for resilience in national infrastructure
1 November 2018, Government and Parastatal (Industry), Security Services & Risk Management
The industries and infrastructure on which so much of our daily lives depend are deep in the midst of mass digitisation.

Read more...
Protecting constantly connected users
1 November 2018, Products & Solutions
The latest versions of ESET security products offer multi-layered protection, enhanced IoT protection, product referral and a new security report feature.

Read more...



<< First   < Previous   Page 37 of 86   Next >   Last >>








While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.