Information Security



Cybersecurity trends 2018
February 2018, Technews Publishing, Editor's Choice
Cybersecurity will remain a key issue for everyone in every industry this year. Here’s what some experts on the topic have to say.

Read more...
Decrypting encryption
February 2018, Technews Publishing, Editor's Choice, Integrated Solutions
Encryption is undoubtedly useful, but has it advanced to the stage where it is also easily usable in business and consumer settings?

Read more...
Tomorrow’s surveillance – today’s reality
February 2018, Technews Publishing, Leaderware, Editor's Choice, Surveillance, News & Events, Integrated Solutions
The Crowne Plaza in Rosebank, Johannesburg, was the setting for the 2017 iLegal conference, a joint venture between Dr Craig Donald and Hi-Tech Security Solutions.

Read more...
Cyber protection for SMEs
February 2018, News & Events
J2 Software has launched a packed solution aimed at helping SMEs get a handle on cyber threats.

Read more...
Managing money for security
February 2018
The industry at large has tightened its belts this year, and as we head into 2018 if 2017 has taught us anything then it is that we can’t afford to skimp on cybersecurity.

Read more...
A quantum leap
February 2018
What the future holds for business IT in 2018.

Read more...
Cyberattacks will not go away
February 2018, Infrastructure
Cybercrime will continue to grow – the issue for businesses is to determine “do the right people have access to the data they are entitled to access”?

Read more...
Encryption is like beer goggles
February 2018
Encryption has become key to protecting the privacy of electronic communication, but it’s a bit like beer goggles, it makes everything look a lot rosier than it is.

Read more...
The science of securing cyber skills
1 February 2018, Training & Education
Urgent measures need to be taken to bridge the rapidly increasing cybersecurity skills gap, says Martin Walshaw, senior systems engineer at F5 Networks.

Read more...
Encryption defined
1 February 2018, Editor's Choice
Encryption is one of the tools that is used to protect data, but should form part of a data security strategy which defines various controls to keep data safe.

Read more...
Hacking public Wi-Fi
1 February 2018, Editor's Choice, Infrastructure
Public Wi-Fi is great in so many ways. However, as much as we love the convenience, hackers love public Wi-Fi too, and for different reasons.

Read more...
Cyber resilience is key to cybersecurity
1 February 2018, Security Services & Risk Management
Organisations must devote more resources to developing the ability to respond to, and recover from, a cyber attack.

Read more...
The missing mobile puzzle piece
November 2017, Infrastructure
Companies are neglecting to define what resources can be accessed via mobile and have not identified what devices are already accessing the network.

Read more...
Back(up) by popular demand
1 November 2017
The market is demanding backup and storage solutions that are simple to operate, efficient, safe and that collate data in a centralised location, for easy accessing from anywhere, and on any device.

Read more...
SOLID webKey is simple security
November 2017, Editor's Choice, News & Events
Ansys débuts its first consumer cybersecurity product with an all-in-one account protection device.

Read more...
Physical and cyber defence centre
November 2017, Editor's Choice, News & Events
XON and NEC Africa will launch their joint Cyber Defence Operation Centre (CDOC), the only such facility from a single service provider in Africa that offers end-to-end physical and cyber defence services.

Read more...
SA manufacturing companies take note
November 2017, Security Services & Risk Management
South Africa’s manufacturing sector is under growing threat of cyber attack, says Sean Duffy, executive of security solutions for MEA at Dimension Data.

Read more...
Advanced malware protection
1 November 2017, Duxbury Networking, Products & Solutions
Intercept-X includes root-cause analytics and advanced malware clean up together with advanced anti-exploit features that block zero-day threats without the need for traditional file scanning.

Read more...
South Africa is a target for cyber attacks
November 2017, Editor's Choice, Security Services & Risk Management
South Africa is currently a magnet for cyberattacks, with hackers set on stealing data.

Read more...
Sophos XG Firewall
November 2017, Products & Solutions
Firewall offers complete identification of unknown application traffic by using information directly from the endpoint, automatically identifies, classifies and controls custom, evasive and generic web applications.

Read more...



<< First   < Previous   Page 42 of 85   Next >   Last >>








While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.