Information Security



TSCM in the 21st century
April 2017, Security Services & Risk Management
“Both cyber and physical security are necessary, but there is an area in between that neither one extends into. That is where TSCM sweeps are needed”.

Read more...
Cloud security: five considerations
1 April 2017, Infrastructure
Forewarned, as they say, is forearmed.

Read more...
Hotels face increasing risk from cyber pirates
1 April 2017, Entertainment and Hospitality (Industry)
Hospitality and entertainment businesses must heed the threat amid a global rise in ransomware attacks.

Read more...
Protect your lifeblood
April 2017, News & Events, Security Services & Risk Management
Data has become so valuable that there are hacking syndicates and lone-wolf hackers who do nothing else but try to steal it.

Read more...
Four steps to surviving ransomware
April 2017, Security Services & Risk Management
Steps to help companies avoid falling victim to a ransomware attack and, in the event of one occurring, to be resilient enough to recover quickly.

Read more...
Securing your security
CCTV Handbook 2017, Technews Publishing, Surveillance, Integrated Solutions, Infrastructure
The digital age has not only seen the security industry migrate to IP, but is now forcing it to be aware of the latest cyber security risks.

Read more...
Wireless works for CCTV
CCTV Handbook 2017, MiRO, Surveillance
Wireless networking is a reasonable choice for surveillance, as long as one uses the right technology and plans correctly.

Read more...
Be prepared for these three cyber threats
CCTV Handbook 2017, Milestone Systems, Editor's Choice, Surveillance, Integrated Solutions
A person or organisation with malicious intent can harm or sabotage a VMS system in several ways. This means that people or assets could be at risk.

Read more...
Cybersecurity: an electronic security distributor’s view
CCTV Handbook 2017, Johnson Controls - (Tyco Security Products), Editor's Choice, Surveillance
Over 79% of South African internet users who have lost money at the hands of cyber criminals have only got some, or none, of their stolen funds back.

Read more...
Weaponised IoT attacks: what does the future hold?
CCTV Handbook 2017, Editor's Choice
The first Mirai attack was a portend of the new, dark era in cybercrime and the physical security industry is right in the middle.

Read more...
Cybersecurity starts with the manufacturer
CCTV Handbook 2017, Johnson Controls - (Tyco Security Products), Surveillance
In the physical security industry, the perception is often that cybersecurity is someone else’s problem. From the end-user’s perspective, the integrator is required to install and configure equipment ...

Read more...
Intelligence and monitoring
March 2017, DCC Techhnologies, Duxbury Networking, Editor's Choice, Access Control & Identity Management, Infrastructure
Understanding the threats you face and your vulnerabilities is a starting point for securing your network.

Read more...
J2 Cyber Security Centre launched
March 2017, News & Events
J2 Software has announced the launch of its Cyber Security Centre (CSC) which is now commercially available to support businesses focused on improving information security and governance.

Read more...
Solving the skills shortage, ­supporting the industry
March 2017, Editor's Choice, Training & Education
One local company in the cyber security world has been stung by the skills shortage, but has made a plan to resolve the situation.

Read more...
Adapt or be hacked
March 2017, Infrastructure
Get the foundation right by deploying architectures that customers can lean on to deploy new technologies that will work effectively together.

Read more...
Machine-learning for defence
March 2017, Infrastructure, Products & Solutions
Trend Micro Network Defense brought to new levels of smart detection and rapid response.

Read more...
AVeS appoints new MD
1 March 2017, News & Events
Professional IT services consultancy AVeS Cyber Security has appointed Cecil Munsamy as its new managing director.

Read more...
Don’t pay the ransom
1 March 2017, Editor's Choice
How to prevent ransomware infections and what to do if you can’t.

Read more...
Uncloaking corruption within encryption
1 March 2017
Securing valuable data flow between applications is essential for safeguarding identity and helping communications between a web browser and a server to remain private.

Read more...
Authlogics appoints AxizWorkgroup as a distributor in Africa
February 2017, News & Events, Infrastructure
Multi-factor authentication company Authlogics has announced that AxizWorkgroup is its first local distributor and will deliver authentication solutions to resellers in Africa.

Read more...



<< First   < Previous   Page 46 of 86   Next >   Last >>








While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.