Information Security



Blockchain explained
1 November 2018, Infrastructure
Blockchain: What is it, how it works and how it is being used in the market? A closer look at the technology that is rapidly growing in popularity.

Read more...
J2 launches Home Secure
1 November 2018, News & Events
J2 Software has announced the launch of J2 Home Secure, aimed at protecting home/personal users from online fraud and cyber threats.

Read more...
Protect your money this festive season
1 November 2018, News & Events
The South African Banking Risk Information Centre (SABRIC), on behalf of the banking industry, would like to make the public aware of how they can protect their money this festive season and shared the following modus operandi to enable greater awareness.

Read more...
A shared responsibility
November 2018, Axis Communications SA, Surveillance
Cybersecurity is a shared responsibility, none of the stakeholders in the market can fight cybercrime alone, we all need to work together to get ahead in the cyber game.

Read more...
Cybersecurity alone is not enough
1 November 2018, Dallmeier Electronic Southern Africa , Surveillance
Cybersecurity alone is not enough: Dallmeier highlights the components for a total security approach in video technology.

Read more...
Card skimming gets more aggressive
1 November 2018, Security Services & Risk Management
The MagentoCore skimmer scam has been described as the most successful skimming campaign to date, with over 7993 online stores hosted on the Magento global ecommerce platform.

Read more...
Check Point announces CloudGuard SaaS
1 November 2018, Infrastructure, Products & Solutions
Check Point Software Technologies announced the general availability of CloudGuard SaaS, a cloud suite designed to prevent sophisticated security threats that target SaaS applications.

Read more...
Getting to the cloud
1 November 2018, Access Control & Identity Management, Infrastructure
Companies are discovering that the cloud presents unique security challenges, amongst which unauthorised access and misuse of employee credentials rank highly.

Read more...
Closer, seamless integration
1 November 2018, Elvey Security Technologies , Access Control & Identity Management, Integrated Solutions
The future will see the industry focusing on closer integration of existing technologies rather than ground-breaking new technology.

Read more...
Winner of the access management system challenge
1 November 2018, News & Events, Access Control & Identity Management
Airports Company of South Africa and Wits University’s Tshimologong Digital Innovation Precinct, launched a search for disruptive and innovative developers to come up with a Single Sign-on access management system.

Read more...
Unknown callers and self-googling
1 November 2018
Altron Bytes Document Solutions offers two unusual, but simple tips to keep your identity secured.

Read more...
DDoS attacks demand different defence strategies
1 November 2018
Despite the fact that firewalls, IPS and load balancers are some of the least effective mitigation measures against distributed DDoS attacks, they remain at the top of the list.

Read more...
New defence approaches required
1 November 2018
As information security faces the need to evolve rapidly to meet a world of new challenges; visibility, user-centricity and crypto currencies will be the order of the day.

Read more...
Smart cities. Is it wise to get smarter?
1 November 2018
As the popularity and inevitability of smart cities expand, so too does a cybercriminal’s opportunistic attack surface.

Read more...
Effective edge security needs to be holistic
October 2018, Technews Publishing
The modern paradigm requires that a holistic and layered approach be adopted to secure networks from breaches at the edge, and everywhere else.

Read more...
Basic cyber hygiene practices
October 2018, Infrastructure
When on the job at a corporate office, a healthcare organisation, or an academic institution or government agency, or even when you are working from a local coffee shop, restaurant, or home office, your organisation’s online safety and security is a responsibility shared by all.

Read more...
Securing edge devices and the data they contain
October 2018, AVeS Cyber Security, Editor's Choice, Infrastructure
Charl Ueckermann looks at some best practices to ensure edge devices are not your biggest risk devices in a hyper-connected, perimeter-less world.

Read more...
CyberGym launches South African arena
October 2018, Wolfpack Information Risk, Editor's Choice, News & Events, Training & Education
Wolfpack recently introduced a new cybersecurity training service to South Africa. CyberGym is an Israeli company that specialises in real-life cyber training, teaching students with real world simulations.

Read more...
GreyEnergy group targeting critical infrastructure
1 October 2018, News & Events
ESET researchers reveal a successor to the feared BlackEnergy APT group - in the footsteps of a feared threat actor, with a new arsenal of tools.

Read more...
J2 offers enterprise-grade security for SMEs
October 2018, News & Events
Rising levels of cybercrime, and its increasing sophistication, threaten businesses of all sizes but SMEs are particularly vulnerable.

Read more...



<< First   < Previous   Page 38 of 86   Next >   Last >>








While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.