Information Security



Visibility is critical
May 2018, Infrastructure
John Mc Loughlin, MD, J2 Software, expands on the predicted increase in ransomware and cyber-extortion tools and what we can do about it.

Read more...
Transform your security
May 2018, Editor's Choice, Infrastructure
In this digital era, data is the currency of choice, unfortunately, opportunities are presented for both organisations and their adversaries.

Read more...
Surviving cybersecurity challenges
May 2018, Axis Communications SA, Editor's Choice
South Africa has the third highest number of cybercrime victims worldwide, with the country losing billions of rand annually.

Read more...
Real-time network visibility
1 May 2018, Infrastructure
When it comes to network downtime in any industry, the underlying statistics tell us one thing: it costs money and lots of it.

Read more...
Insecure security
1 May 2018
ESET researchers have analysed a newly discovered set of apps on Google Play, Google’s official Android app store, that pose as security applications.

Read more...
A turbulent region
1 May 2018
Kaspersky Lab reveals cybersecurity trends in the Middle East, Turkey and Africa, with South Africa putting in a good showing in the cyber landscape.

Read more...
Cybersecurity awareness is key
May 2018, Training & Education
GNL Cyber offers a wide range of tailored cybersecurity training courses, designed to address the changing cyber threat landscape.

Read more...
How to maintain cybersecurity across all your devices
April 2018, Axis Communications SA, Editor's Choice, Surveillance, Integrated Solutions
It is important that they have the right knowledge and tools to manage cybersecurity throughout the lifecycle of your surveillance system.

Read more...
Strengthening IoT security
1 April 2018, Editor's Choice, Industrial (Industry)
Kaspersky Lab comes together with ITU-T to strengthen IoT security through a new standard that classifies security issues for IoT.

Read more...
Managing security in the cloud
April 2018, Editor's Choice, Security Services & Risk Management
According to BT’s CEO 2017 survey, cloud computing is cited as one of four critical technology trends that are likely to have the most significant impact on business over the next two to three years.

Read more...
Put a SOC in it
April 2018, Security Services & Risk Management
Datacentrix takes on hacktivism and other vulnerabilities with two new services in its Security Operations Centre.

Read more...
New cloud security technology
April 2018, Editor's Choice, Security Services & Risk Management
We have moved past a threshold where the traditional security approaches don’t fit with the dynamic nature of the cloud, leaving businesses exposed to a whole host of new threats.

Read more...
Surveillance camera vulnerabilities
April 2018
Kaspersky Lab discovers severe flaws that could transform popular smart cameras into surveillance tools.

Read more...
Cyber complacency is real
April 2018, Editor's Choice
New report from CA Veracode reveals business leaders only address cybersecurity under duress.

Read more...
The cybersecurity of physical ­security
CCTV Handbook 2018, Editor's Choice
Being aware of the dangers is one thing, but actually knowing what you need to look out for and do to secure your surveillance infrastructure, is quite another.

Read more...
The network is the camera
CCTV Handbook 2018, Infrastructure
Protecting your network is a critical step in protecting your security infrastructure as well as your business. Hi-Tech Security Solutions talks to Aruba Networks about network security.

Read more...
The question of value
CCTV Handbook 2018, Technews Publishing, Editor's Choice, Surveillance, Integrated Solutions
How do you know your surveillance installation is delivering value? Do your service providers deliver value?

Read more...
Beyond the hype: tomorrow’s surveillance, today’s reality
CCTV Handbook 2018, Technews Publishing, Editor's Choice, Surveillance, Integrated Solutions, Infrastructure, Conferences & Events, Training & Education
iLegal 2017 once again lived up to its reputation and saw a host of presenters offering insights and advice into a range of aspects related to the surveillance world.

Read more...
Securing your surveillance
CCTV Handbook 2018, Surveillance, Integrated Solutions
What are the basics your average company can do to secure its surveillance infrastructure from the various threats out there?

Read more...
Feeling vulnerable?
CCTV Handbook 2018, Axis Communications SA, Surveillance
One could be forgiven for being sick and tired of hearing about cybersecurity, as it seems to be everywhere, all the time. But the threat is real.

Read more...



<< First   < Previous   Page 42 of 87   Next >   Last >>








While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.