Information Security



Protecting the machines
July 2018, Technews Publishing, Editor's Choice, Integrated Solutions, Industrial (Industry)
Security operations at industrial sites need to include cybersecurity and it needs to be treated with the same importance as the physical security of the site as well as health and safety standards.

Read more...
Securex 2018 pulls the (right) crowds
July 2018, Technews Publishing, Access Control & Identity Management, Surveillance, Integrated Solutions
With over 6000 visitors attending and exhibitors expressing their satisfaction with not only the number, but also the calibre of the visitors, this year’s Securex was a winner.

Read more...
Securing your digital assets
July 2018, Technews Publishing, Editor's Choice, Infrastructure
Cyberattacks can’t be prevented, but companies and individuals have ways to keep the attackers out. However, the coming year will see more attacks and more losses because of poor cyber planning.

Read more...
The generations that matter
July 2018, Technews Publishing, Editor's Choice, Security Services & Risk Management
According to Doros Hadjizenonos, country manager, SADC at Check Point, we have entered the fifth generation of cyberattacks.

Read more...
EOH introduces managed Security-as-a-Service
July 2018, News & Events, Security Services & Risk Management
EOH has introduced a solution to modern security concerns through a managed Security-as-a-Service suite of offerings.

Read more...
How data leaks can be avoided
July 2018, Editor's Choice, News & Events, Security Services & Risk Management
MyID runs as a service, monitoring your ID number, email address, mobile number and credit card number for fraudulent usage or fraudulent input on the Web.

Read more...
Securing the Internet of Things
July 2018, Industrial (Industry)
With more than 75 billion devices expected to be connected to the Internet by 2025, the Internet of Things (IoT) has become an integral part of the digital world, but are these devices secure?

Read more...
Being prepared is key to mitigating cyber attacks
1 July 2018
In an age where cyber criminals are a dime a dozen, and the threat landscape more complex than ever, it pays to prepare and be always on guard.

Read more...
Securing your operational systems
1 July 2018, Industrial (Industry)
Forrester research on operational technology (OT) cybersecurity: 56% of organisations experienced a security breach last year.

Read more...
Watch out for digital profiling
1 July 2018, Editor's Choice
Research shows that smartwatches can become tools for spying on their owners, by collecting signals that – after analysis – could be turned into datasets unique to the smartwatch owner.

Read more...
Intelligence and compliance ­depend on data governance
June 2018, Technews Publishing, Editor's Choice, Security Services & Risk Management
The growth of data in all its forms caused data governance to become increasingly complex, to the point where it is a skill in itself.

Read more...
Data governance and security
June 2018, Technews Publishing, Editor's Choice, Security Services & Risk Management
Data governance has become a key issue for all businesses, and as with all things data-related these days, security is a key component of data governance.

Read more...
The dark side of the Internet
June 2018, Editor's Choice
Research from Check Point Software Technologies shows that Telegram may be the new channel of choice for conducting cybercrime anonymously.

Read more...
Vulnerabilities in industrial protocol
June 2018, Kaspersky, News & Events
Kaspersky Lab discovers critical vulnerabilities in popular industrial protocol, affecting products from multiple vendors.

Read more...
NEC XON gets ISO 27001 cybersecurity certification
1 June 2018, News & Events
NEC XON has obtained ISO 27001 certification for its Cyber Defence Operations Centre and Network Operations Centre.

Read more...
New security solutions
1 June 2018, Products & Solutions
A new suite of enterprise security solutions from ESET has been launched, including a new management platform and various products and services.

Read more...
New ransomware variant in the wild
1 June 2018
New variant of SynAck ransomware uses sophisticated Doppelgänging technique to evade security.

Read more...
Making cents out of the security mix
May 2018, Cathexis Technologies, Xone Integrated Security, Editor's Choice, Surveillance, Integrated Solutions, Financial (Industry)
Hi-Tech Security Solutions chats to industry specialists about the security mix, cybercrime and the onslaught of artificial intelligence in the financial sector.

Read more...
More of the same, but more sophisticated
May 2018, Duxbury Networking, Editor's Choice, Integrated Solutions, Infrastructure
We’ve been protecting networks from criminals for many years, but as soon as the defences improve, the attacks get more sophisticated.

Read more...
Make sure the channels are safe
May 2018, Editor's Choice, Infrastructure
Companies should be aware of how many possible data leakage sources they have: e-mail, phone calls, instant messengers and social networks, cloud storage, external storage devices – to name a few.

Read more...



<< First   < Previous   Page 41 of 87   Next >   Last >>








While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.