Information Security



Data governance and the security industry
June 2017, Technews Publishing, Infrastructure, Security Services & Risk Management
So how does all the talk about data governance and data protection impact the security industry? Or does it?

Read more...
Physical security is from Mars, IT is from Venus
June 2017, Axis Communications SA
The days of separating physical and digital security are over. Today we need a collaborative approach to succeed in preventing and/or dealing with cyber attacks.

Read more...
Card fraud stats 2016
June 2017, Editor's Choice, News & Events, Security Services & Risk Management
Credit card fraud increased by 13% from R331.4m in 2015 to R374.4m in 2016, with debit card fraud increasing by 3.1% for the same period.

Read more...
Hikvision and Cisco collaborate on cybersecurity
June 2017, Hikvision South Africa, Editor's Choice, Surveillance, News & Events
Cisco is sharing its professional cybersecurity management experience and technologies with Hikvision, facilitating Hikvision’s globalisation process.

Read more...
Cyber-attacks to the left, ransomware to the right
June 2017, Editor's Choice, News & Events
We all need to be agile and responsive to the new unknowns; here are some tips for preventing future nasties like WannaCry and Petya.

Read more...
Trusted Platform Module explained
May 2017, Bosch Building Technologies, Editor's Choice, Surveillance
Bosch IP cameras, encoders and selected storage systems have an onboard security chip – actually a system-on-a-chip called the Trusted Platform Module – that provides functionality similar to crypto smartcards.

Read more...
Procore Trading
Securex 2017 preview
Procore Trading’s Intimus 9000 Degausser uses most modern APT technology to erase information from hard drives. The Intimus 9000 produces an erasing field many times stronger than those produced by the ...

Read more...
Security skills shortage?
1 May 2017, Training & Education
We’re currently faced with a global information security skills crisis with an expected deficit of 1.5 million people within five years.

Read more...
Niall Beazley looks at some of the issues end users should consider when deciding on surveillance solutions: you get what you pay for.
1 May 2017, Surveillance, Integrated Solutions
Niall Beazley looks at some of the issues end users should consider when deciding on surveillance solutions: you get what you pay for.

Read more...
IoT running wild compromises security
1 May 2017, Genetec, Editor's Choice, Surveillance
Constant connectivity and the rapid flow of information may offer new and convenient ways to do business and create value, but it also places the corporate network at significant risk.

Read more...
Are you afraid of the dark (net)?
1 May 2017, Editor's Choice
Given the recent global malware attacks, you should be, argues John McLoughlin, MD, J2 Software. Worst of all, you are probably not aware you have been hacked.

Read more...
Accelerating the community theme
1 May 2017, Milestone Systems, Editor's Choice, Surveillance, News & Events
Milestone Community Days EMEA (MIPS) in Dubai highlighted the company’s platform strategy, connected products for the small and medium-sized businesses and higher performing software.

Read more...
The cloud and security
April 2017, Surveillance, Perimeter Security, Alarms & Intruder Detection
Security and the cloud are well suited to each other if the solution is set up and managed effectively.

Read more...
It’s still your data
April 2017, Editor's Choice, Infrastructure, Security Services & Risk Management
The cloud can be secure, or not. Choose your provider and check your contract carefully. In the end, your data is your baby.

Read more...
Setting your security posture
April 2017, Infrastructure
Hi-Tech Security Solutions finds out what a security posture is and how to determine yours.

Read more...
TSCM in the 21st century
April 2017, Security Services & Risk Management
“Both cyber and physical security are necessary, but there is an area in between that neither one extends into. That is where TSCM sweeps are needed”.

Read more...
Cloud security: five considerations
1 April 2017, Infrastructure
Forewarned, as they say, is forearmed.

Read more...
Hotels face increasing risk from cyber pirates
1 April 2017, Entertainment and Hospitality (Industry)
Hospitality and entertainment businesses must heed the threat amid a global rise in ransomware attacks.

Read more...
Protect your lifeblood
April 2017, News & Events, Security Services & Risk Management
Data has become so valuable that there are hacking syndicates and lone-wolf hackers who do nothing else but try to steal it.

Read more...
Four steps to surviving ransomware
April 2017, Security Services & Risk Management
Steps to help companies avoid falling victim to a ransomware attack and, in the event of one occurring, to be resilient enough to recover quickly.

Read more...



<< First   < Previous   Page 46 of 87   Next >   Last >>








While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.