Information Security



Securing the Internet of Things
July 2018, Industrial (Industry)
With more than 75 billion devices expected to be connected to the Internet by 2025, the Internet of Things (IoT) has become an integral part of the digital world, but are these devices secure?

Read more...
Being prepared is key to mitigating cyber attacks
1 July 2018
In an age where cyber criminals are a dime a dozen, and the threat landscape more complex than ever, it pays to prepare and be always on guard.

Read more...
Securing your operational systems
1 July 2018, Industrial (Industry)
Forrester research on operational technology (OT) cybersecurity: 56% of organisations experienced a security breach last year.

Read more...
Watch out for digital profiling
1 July 2018, Editor's Choice
Research shows that smartwatches can become tools for spying on their owners, by collecting signals that – after analysis – could be turned into datasets unique to the smartwatch owner.

Read more...
Intelligence and compliance ­depend on data governance
June 2018, Technews Publishing, Editor's Choice, Security Services & Risk Management
The growth of data in all its forms caused data governance to become increasingly complex, to the point where it is a skill in itself.

Read more...
Data governance and security
June 2018, Technews Publishing, Editor's Choice, Security Services & Risk Management
Data governance has become a key issue for all businesses, and as with all things data-related these days, security is a key component of data governance.

Read more...
The dark side of the Internet
June 2018, Editor's Choice
Research from Check Point Software Technologies shows that Telegram may be the new channel of choice for conducting cybercrime anonymously.

Read more...
Vulnerabilities in industrial protocol
June 2018, Kaspersky, News & Events
Kaspersky Lab discovers critical vulnerabilities in popular industrial protocol, affecting products from multiple vendors.

Read more...
NEC XON gets ISO 27001 cybersecurity certification
1 June 2018, News & Events
NEC XON has obtained ISO 27001 certification for its Cyber Defence Operations Centre and Network Operations Centre.

Read more...
New security solutions
1 June 2018, Products & Solutions
A new suite of enterprise security solutions from ESET has been launched, including a new management platform and various products and services.

Read more...
New ransomware variant in the wild
1 June 2018
New variant of SynAck ransomware uses sophisticated Doppelgänging technique to evade security.

Read more...
Making cents out of the security mix
May 2018, Cathexis Technologies, Xone Integrated Security, Editor's Choice, Surveillance, Integrated Solutions, Financial (Industry)
Hi-Tech Security Solutions chats to industry specialists about the security mix, cybercrime and the onslaught of artificial intelligence in the financial sector.

Read more...
More of the same, but more sophisticated
May 2018, Duxbury Networking, Editor's Choice, Integrated Solutions, Infrastructure
We’ve been protecting networks from criminals for many years, but as soon as the defences improve, the attacks get more sophisticated.

Read more...
Make sure the channels are safe
May 2018, Editor's Choice, Infrastructure
Companies should be aware of how many possible data leakage sources they have: e-mail, phone calls, instant messengers and social networks, cloud storage, external storage devices – to name a few.

Read more...
Visibility is critical
May 2018, Infrastructure
John Mc Loughlin, MD, J2 Software, expands on the predicted increase in ransomware and cyber-extortion tools and what we can do about it.

Read more...
Transform your security
May 2018, Editor's Choice, Infrastructure
In this digital era, data is the currency of choice, unfortunately, opportunities are presented for both organisations and their adversaries.

Read more...
Surviving cybersecurity challenges
May 2018, Axis Communications SA, Editor's Choice
South Africa has the third highest number of cybercrime victims worldwide, with the country losing billions of rand annually.

Read more...
Real-time network visibility
1 May 2018, Infrastructure
When it comes to network downtime in any industry, the underlying statistics tell us one thing: it costs money and lots of it.

Read more...
Insecure security
1 May 2018
ESET researchers have analysed a newly discovered set of apps on Google Play, Google’s official Android app store, that pose as security applications.

Read more...
A turbulent region
1 May 2018
Kaspersky Lab reveals cybersecurity trends in the Middle East, Turkey and Africa, with South Africa putting in a good showing in the cyber landscape.

Read more...



<< First   < Previous   Page 40 of 86   Next >   Last >>








While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.