Information Security



Growing concern over global cybersecurity
August 2017, News & Events
The average cost of a security breach in the UK is R40,5 million, while DDoS attacks costs an average of R500 000 an hour to defend.

Read more...
GNL Cyber launches South African operation
August 2017, Editor's Choice, News & Events, Training & Education
Gold N’ Links Cyber (GNL) has established its presence in South Africa. Its launch event at its new Johannesburg offices in July was attended by a variety of dignitaries, key leaders in business, as well as VIPs such as the outgoing Israeli Ambassador.

Read more...
Human readiness training
August 2017, Training & Education
While the majority of corporate employees won’t fall victim to a phishing attack, at some point some will.

Read more...
Shortage in cybersecurity skills
August 2017, News & Events
Cisco South Africa launches a Cyber Security Experience Centre and Academy, the first of its kind to educate and fast track the skills needed to deal with the growing global challenge of cybersecurity.

Read more...
Three questions to ask
August 2017, Healthcare (Industry)
Experian’s fourth annual 2017 Data Breach Industry Forecast states that healthcare organisations will be the most targeted sector for attack, with new and sophisticated attacks emerging.

Read more...
Email is the weak link
July 2017, Editor's Choice, Security Services & Risk Management
Email remains any firm’s most important business tool and 43-trillion emails are sent annually The problem with email is that it was not designed to be secure.

Read more...
Biggest threat to industrial systems
July 2017, Editor's Choice, Security Services & Risk Management, Industrial (Industry)
The biggest threat to industrial control systems since Stuxnet is Industroyer, a sophisticated and extremely dangerous malware designed to disrupt critical industrial processes.

Read more...
Cybersecurity for access control
July 2017, Editor's Choice, Access Control & Identity Management, Asset Management
Farpointe provides cybersecurity vulnerability checklist for contactless cards and readers.

Read more...
Can you survive a cyber attack?
July 2017, Security Services & Risk Management
The Cyber Resilience Framework provides a comprehensive, flexible structure to ensure organisations can survive cyber attacks.

Read more...
Don’t ignore the mobile threat
July 2017
50% of all mobile and tablet devices are not protected against cybercrime and malicious threats, that equates to about 40 million entry points into corporations and company networks.

Read more...
Data governance and the security industry
June 2017, Technews Publishing, Infrastructure, Security Services & Risk Management
So how does all the talk about data governance and data protection impact the security industry? Or does it?

Read more...
Physical security is from Mars, IT is from Venus
June 2017, Axis Communications SA
The days of separating physical and digital security are over. Today we need a collaborative approach to succeed in preventing and/or dealing with cyber attacks.

Read more...
Card fraud stats 2016
June 2017, Editor's Choice, News & Events, Security Services & Risk Management
Credit card fraud increased by 13% from R331.4m in 2015 to R374.4m in 2016, with debit card fraud increasing by 3.1% for the same period.

Read more...
Hikvision and Cisco collaborate on cybersecurity
June 2017, Hikvision South Africa, Editor's Choice, Surveillance, News & Events
Cisco is sharing its professional cybersecurity management experience and technologies with Hikvision, facilitating Hikvision’s globalisation process.

Read more...
Cyber-attacks to the left, ransomware to the right
June 2017, Editor's Choice, News & Events
We all need to be agile and responsive to the new unknowns; here are some tips for preventing future nasties like WannaCry and Petya.

Read more...
Trusted Platform Module explained
May 2017, Bosch Building Technologies, Editor's Choice, Surveillance
Bosch IP cameras, encoders and selected storage systems have an onboard security chip – actually a system-on-a-chip called the Trusted Platform Module – that provides functionality similar to crypto smartcards.

Read more...
Procore Trading
Securex 2017 preview
Procore Trading’s Intimus 9000 Degausser uses most modern APT technology to erase information from hard drives. The Intimus 9000 produces an erasing field many times stronger than those produced by the ...

Read more...
Security skills shortage?
1 May 2017, Training & Education
We’re currently faced with a global information security skills crisis with an expected deficit of 1.5 million people within five years.

Read more...
Niall Beazley looks at some of the issues end users should consider when deciding on surveillance solutions: you get what you pay for.
1 May 2017, Surveillance, Integrated Solutions
Niall Beazley looks at some of the issues end users should consider when deciding on surveillance solutions: you get what you pay for.

Read more...
IoT running wild compromises security
1 May 2017, Genetec, Editor's Choice, Surveillance
Constant connectivity and the rapid flow of information may offer new and convenient ways to do business and create value, but it also places the corporate network at significant risk.

Read more...



<< First   < Previous   Page 44 of 85   Next >   Last >>








While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.