Information Security



Are you afraid of the dark (net)?
1 May 2017, Editor's Choice
Given the recent global malware attacks, you should be, argues John McLoughlin, MD, J2 Software. Worst of all, you are probably not aware you have been hacked.

Read more...
Accelerating the community theme
1 May 2017, Milestone Systems, Editor's Choice, Surveillance, News & Events
Milestone Community Days EMEA (MIPS) in Dubai highlighted the company’s platform strategy, connected products for the small and medium-sized businesses and higher performing software.

Read more...
The cloud and security
April 2017, Surveillance, Perimeter Security, Alarms & Intruder Detection
Security and the cloud are well suited to each other if the solution is set up and managed effectively.

Read more...
It’s still your data
April 2017, Editor's Choice, Infrastructure, Security Services & Risk Management
The cloud can be secure, or not. Choose your provider and check your contract carefully. In the end, your data is your baby.

Read more...
Setting your security posture
April 2017, Infrastructure
Hi-Tech Security Solutions finds out what a security posture is and how to determine yours.

Read more...
TSCM in the 21st century
April 2017, Security Services & Risk Management
“Both cyber and physical security are necessary, but there is an area in between that neither one extends into. That is where TSCM sweeps are needed”.

Read more...
Cloud security: five considerations
1 April 2017, Infrastructure
Forewarned, as they say, is forearmed.

Read more...
Hotels face increasing risk from cyber pirates
1 April 2017, Entertainment and Hospitality (Industry)
Hospitality and entertainment businesses must heed the threat amid a global rise in ransomware attacks.

Read more...
Protect your lifeblood
April 2017, News & Events, Security Services & Risk Management
Data has become so valuable that there are hacking syndicates and lone-wolf hackers who do nothing else but try to steal it.

Read more...
Four steps to surviving ransomware
April 2017, Security Services & Risk Management
Steps to help companies avoid falling victim to a ransomware attack and, in the event of one occurring, to be resilient enough to recover quickly.

Read more...
Securing your security
CCTV Handbook 2017, Technews Publishing, Surveillance, Integrated Solutions, Infrastructure
The digital age has not only seen the security industry migrate to IP, but is now forcing it to be aware of the latest cyber security risks.

Read more...
Wireless works for CCTV
CCTV Handbook 2017, MiRO, Surveillance
Wireless networking is a reasonable choice for surveillance, as long as one uses the right technology and plans correctly.

Read more...
Be prepared for these three cyber threats
CCTV Handbook 2017, Milestone Systems, Editor's Choice, Surveillance, Integrated Solutions
A person or organisation with malicious intent can harm or sabotage a VMS system in several ways. This means that people or assets could be at risk.

Read more...
Cybersecurity: an electronic security distributor’s view
CCTV Handbook 2017, Johnson Controls - (Tyco Security Products), Editor's Choice, Surveillance
Over 79% of South African internet users who have lost money at the hands of cyber criminals have only got some, or none, of their stolen funds back.

Read more...
Weaponised IoT attacks: what does the future hold?
CCTV Handbook 2017, Editor's Choice
The first Mirai attack was a portend of the new, dark era in cybercrime and the physical security industry is right in the middle.

Read more...
Cybersecurity starts with the manufacturer
CCTV Handbook 2017, Johnson Controls - (Tyco Security Products), Surveillance
In the physical security industry, the perception is often that cybersecurity is someone else’s problem. From the end-user’s perspective, the integrator is required to install and configure equipment ...

Read more...
Intelligence and monitoring
March 2017, DCC Techhnologies, Duxbury Networking, Editor's Choice, Access Control & Identity Management, Infrastructure
Understanding the threats you face and your vulnerabilities is a starting point for securing your network.

Read more...
J2 Cyber Security Centre launched
March 2017, News & Events
J2 Software has announced the launch of its Cyber Security Centre (CSC) which is now commercially available to support businesses focused on improving information security and governance.

Read more...
Solving the skills shortage, ­supporting the industry
March 2017, Editor's Choice, Training & Education
One local company in the cyber security world has been stung by the skills shortage, but has made a plan to resolve the situation.

Read more...
Adapt or be hacked
March 2017, Infrastructure
Get the foundation right by deploying architectures that customers can lean on to deploy new technologies that will work effectively together.

Read more...



<< First   < Previous   Page 45 of 85   Next >   Last >>








While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.