Information Security



Effective edge security needs to be holistic
October 2018, Technews Publishing
The modern paradigm requires that a holistic and layered approach be adopted to secure networks from breaches at the edge, and everywhere else.

Read more...
Basic cyber hygiene practices
October 2018, Infrastructure
When on the job at a corporate office, a healthcare organisation, or an academic institution or government agency, or even when you are working from a local coffee shop, restaurant, or home office, your organisation’s online safety and security is a responsibility shared by all.

Read more...
Securing edge devices and the data they contain
October 2018, AVeS Cyber Security, Editor's Choice, Infrastructure
Charl Ueckermann looks at some best practices to ensure edge devices are not your biggest risk devices in a hyper-connected, perimeter-less world.

Read more...
CyberGym launches South African arena
October 2018, Wolfpack Information Risk, Editor's Choice, News & Events, Training & Education
Wolfpack recently introduced a new cybersecurity training service to South Africa. CyberGym is an Israeli company that specialises in real-life cyber training, teaching students with real world simulations.

Read more...
GreyEnergy group targeting critical infrastructure
1 October 2018, News & Events
ESET researchers reveal a successor to the feared BlackEnergy APT group - in the footsteps of a feared threat actor, with a new arsenal of tools.

Read more...
J2 offers enterprise-grade security for SMEs
October 2018, News & Events
Rising levels of cybercrime, and its increasing sophistication, threaten businesses of all sizes but SMEs are particularly vulnerable.

Read more...
Tax season is financial crime season
1 October 2018, Security Services & Risk Management
Carey van Vlaanderen from ESET offers some steps you can take to keep the scammers at bay during financial crime season – and all year round.

Read more...
The most important features of a management platform
September 2018, Technews Publishing, Editor's Choice, Surveillance, Access Control & Identity Management, Integrated Solutions
Hi-Tech Security Solutions asks the industry for the top three features you should be looking for in a security management platform.

Read more...
Nearly every third corporate data breach gets employees fired
1 September 2018, News & Events
According to a new report from Kaspersky Lab and B2B International, 25% of data breaches in the Middle East, Turkey and Africa (META) region in the past year have led to people losing their jobs.

Read more...
IoT in your home: what are the risks?
1 September 2018
Put security in place before investing in IoT smart home devices.

Read more...
Threats to control rooms
September 2018, Contract Surveillance Services, Surveillance
CSS offers advice for protecting remote control rooms from criminal attacks and interference.

Read more...
The link between passwords and sextortion
1 September 2018, Editor's Choice
John Mc Loughlin, CEO of J2 Software, says the company is being engaged to consult with victims of what is becoming an alarming increase in incidents of sextortion.

Read more...
Modern KPIs for effective cybersecurity
1 September 2018
Faced with increasingly frequent and sophisticated cyber-attacks, enterprises are scrambling to put technologies and processes in place to effectively detect and combat cyber risks.

Read more...
Ten cybersecurity smart home tips from Ben-Gurion University
1 September 2018
According to cyber researchers at Ben-Gurion University of the Negev, Cyber Security Awareness Month is an excellent time to make a few simple changes that will result in a far greater level of safety and security.

Read more...
Facing the cybersecurity challenge
August 2018, Technews Publishing
There are many cybersecurity products and solutions out there, but what do they offer and how will they protect you and strengthen your cybersecurity posture?

Read more...
Visibility is security
August 2018
Andrew Wilson, CEO at LucidView says effective threat detection boils down to one thing – visibility.

Read more...
5 steps to integrating business continuity and cyber resilience
August 2018, Security Services & Risk Management
It is imperative that cyber resilience is integrated into organisations’ business continuity management plans.

Read more...
Knowledge and visibility leads to security
1 August 2018
John Mc Loughlin highlights some key areas an organisation needs to take note of in effectively securing their systems from cyber-attacks in all their different forms.

Read more...
The cyber-skills conundrum
1 August 2018
A lack of skilled resources is not the only factor behind the cybersecurity workforce shortage, says Rick Rogers, area manager for Africa at Check Point Technologies.

Read more...
Nearly every third corporate data breach gets employees fired
1 August 2018
According to a new report from Kaspersky Lab and B2B International, 25% of data breaches in the Middle East, Turkey and Africa (META) region in the past year have led to people losing their jobs.

Read more...



<< First   < Previous   Page 40 of 87   Next >   Last >>








While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.