Information Security



A quantum leap
February 2018
What the future holds for business IT in 2018.

Read more...
Cyberattacks will not go away
February 2018, Infrastructure
Cybercrime will continue to grow – the issue for businesses is to determine “do the right people have access to the data they are entitled to access”?

Read more...
Encryption is like beer goggles
February 2018
Encryption has become key to protecting the privacy of electronic communication, but it’s a bit like beer goggles, it makes everything look a lot rosier than it is.

Read more...
The science of securing cyber skills
1 February 2018, Training & Education
Urgent measures need to be taken to bridge the rapidly increasing cybersecurity skills gap, says Martin Walshaw, senior systems engineer at F5 Networks.

Read more...
Encryption defined
1 February 2018, Editor's Choice
Encryption is one of the tools that is used to protect data, but should form part of a data security strategy which defines various controls to keep data safe.

Read more...
Hacking public Wi-Fi
1 February 2018, Editor's Choice, Infrastructure
Public Wi-Fi is great in so many ways. However, as much as we love the convenience, hackers love public Wi-Fi too, and for different reasons.

Read more...
Cyber resilience is key to cybersecurity
1 February 2018, Security Services & Risk Management
Organisations must devote more resources to developing the ability to respond to, and recover from, a cyber attack.

Read more...
The missing mobile puzzle piece
November 2017, Infrastructure
Companies are neglecting to define what resources can be accessed via mobile and have not identified what devices are already accessing the network.

Read more...
Back(up) by popular demand
1 November 2017
The market is demanding backup and storage solutions that are simple to operate, efficient, safe and that collate data in a centralised location, for easy accessing from anywhere, and on any device.

Read more...
SOLID webKey is simple security
November 2017, Editor's Choice, News & Events
Ansys débuts its first consumer cybersecurity product with an all-in-one account protection device.

Read more...
Physical and cyber defence centre
November 2017, Editor's Choice, News & Events
XON and NEC Africa will launch their joint Cyber Defence Operation Centre (CDOC), the only such facility from a single service provider in Africa that offers end-to-end physical and cyber defence services.

Read more...
SA manufacturing companies take note
November 2017, Security Services & Risk Management
South Africa’s manufacturing sector is under growing threat of cyber attack, says Sean Duffy, executive of security solutions for MEA at Dimension Data.

Read more...
Advanced malware protection
1 November 2017, Duxbury Networking, Products & Solutions
Intercept-X includes root-cause analytics and advanced malware clean up together with advanced anti-exploit features that block zero-day threats without the need for traditional file scanning.

Read more...
South Africa is a target for cyber attacks
November 2017, Editor's Choice, Security Services & Risk Management
South Africa is currently a magnet for cyberattacks, with hackers set on stealing data.

Read more...
Sophos XG Firewall
November 2017, Products & Solutions
Firewall offers complete identification of unknown application traffic by using information directly from the endpoint, automatically identifies, classifies and controls custom, evasive and generic web applications.

Read more...
Ransomware defined 2017
November 2017, Editor's Choice
Ransomware ravaged Windows, but attacks on Android, Linux and MacOS systems also increased, while just two strains of ransomware were responsible for 89.5% of all attacks in 2017.

Read more...
Securing your access security
Access & Identity Management Handbook 2018, G4S Secure Solutions SA, Impro Technologies, Editor's Choice, Access Control & Identity Management
While one may not consider access control solutions a prime hacking target, any connected device is a target in today’s world.

Read more...
Packaged cyber-threat service
October 2017, News & Events
Gold ‘N Links Cyber introduces GNL CYBER 360, a per user, next generation cyber-threat packaged service.

Read more...
More than physical intrusion
October 2017, Mining (Industry)
Mining and manufacturing sectors are becoming increasingly vulnerable to cyber attack. This is highlighted in Dimension Data’s Global Threat Intelligence Report for 2017.

Read more...
Compliance is knowing
October 2017, Infrastructure
There are two types of businesses, those who have been breached and those that don’t know that they have been breached.

Read more...



<< First   < Previous   Page 43 of 86   Next >   Last >>








While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.