Information Security



A logical solution for cyber solutions
March 2019, Suprema, Access Control & Identity Management, Products & Solutions
BioMini Slim 2 is a thin, FBI PIV and FBI Mobile ID certified FAP20 optical scanner with a large platen for easy capturing of fingerprints.

Read more...
Managed IT security solution
March 2019, Infrastructure, Products & Solutions
The LanDynamix fully managed IT security stack ensures that all the main attack vectors typically used by hackers to breach a network are protected and proactively monitored.

Read more...
Top five security trends to look out for in 2019
March 2019, Genetec, Surveillance
From the continued focus on cybersecurity to the acquisition of global players, Genetec highlights the top five security trends to look forward to in 2019.

Read more...
Cyber Risk 101
March 2019
What every business needs to know about protecting themselves in case of a cyber-attack.

Read more...
Securing IoT, step by step
March 2019, Infrastructure
Kaspersky Lab joins forces with industry leaders to deliver actionable technical guidance for multiple IoT stakeholders.

Read more...
ESET launches a new blog aimed at insecure Android apps
March 2019
Insecure apps are much harder to identify and protect, while being no less of a threat.

Read more...
How to spot if your password was stolen in a security breach
1 March 2019
This article will tell you how to find out if your email address or password has been stolen and to check if passwords you are choosing are secure or not.

Read more...
The legalities of the digital signature
1 March 2019, Editor's Choice, Security Services & Risk Management
Electronic signatures and digital signatures differ significantly; it is critical that organisations recognise the legal implications of the electronic signature and the risk of fraud.

Read more...
How quickly could a cyber-attack take down critical infrastructure?
1 March 2019
With crucial national infrastructure like power systems and manufacturing currently in the spotlight, stakeholders need to consider the impacts of unseen risks, such as cyber-attacks, on operational technology networks.

Read more...
Security and cloud computing
1 March 2019, Integrated Solutions
Improving security is a strong motivation to accelerate the move from traditional IT architectures to modern, cloud ones.

Read more...
Cybersecurity is not enough
1 March 2019
Dallmeier presents the components for a total security approach in video technology.

Read more...
Insiders and personal data fraud
1 March 2019, Security Services & Risk Management
Our passport data, payment details, home addresses and e-mail addresses, phone numbers are stored in databases of more than a dozen institutions.

Read more...
2019 cybersecurity crystal ball
February 2019, Wolfpack Information Risk, Editor's Choice
Craig Rosewarne, MD of Wolfpack Information Risk says the cyber landscape will be more volatile and dangerous in 2019, are we ready?

Read more...
50% of companies can’t detect IoT breaches
1 February 2019, Editor's Choice, Infrastructure
Only around half (48%) of businesses can detect if any of their IoT devices suffer a breach. This comes despite an increased focus on IoT security.

Read more...
Data security sits at the heart of democracy
1 February 2019, Security Services & Risk Management
A succession of high-profile government data breaches both locally and abroad has cast a stark light on the importance of effective public sector cybersecurity policies and protections.

Read more...
Corporate fraud and insider threats
1 February 2019, Security Services & Risk Management
Insider fraud and theft can often be more damaging to a company than risks from outside.

Read more...
Corporate privacy in a selfie age
1 February 2019, Security Services & Risk Management
Doros Hadjizenonos, regional sales director at Fortinet in South Africa looks at how CISOs can maintain corporate privacy even as employees adopt emerging technologies.

Read more...
SME cybersecurity: high risk
1 February 2019, Infrastructure
Small and medium-sized businesses are becoming more attractive targets for cyber criminals – both direct and also as a starting point for larger attacks across a supply chain.

Read more...
Kaspersky unveils new partner programme
1 February 2019, Kaspersky, News & Events
Specialised, enabling and profitable: Kaspersky Lab unveils new programme to empower its partners and improve services to clients.

Read more...
Integration is communication
1 February 2019, AVeS Cyber Security, Integrated Solutions
Communication is the missing link for integrating physical and IT security resources, says Charl Ueckermann, CEO at AVeS Cyber Security.

Read more...



<< First   < Previous   Page 37 of 87   Next >   Last >>








While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.