Information Security



Four steps to surviving ransomware
April 2017, Security Services & Risk Management
Steps to help companies avoid falling victim to a ransomware attack and, in the event of one occurring, to be resilient enough to recover quickly.

Read more...
Securing your security
CCTV Handbook 2017, Technews Publishing, Surveillance, Integrated Solutions, Infrastructure
The digital age has not only seen the security industry migrate to IP, but is now forcing it to be aware of the latest cyber security risks.

Read more...
Wireless works for CCTV
CCTV Handbook 2017, MiRO, Surveillance
Wireless networking is a reasonable choice for surveillance, as long as one uses the right technology and plans correctly.

Read more...
Be prepared for these three cyber threats
CCTV Handbook 2017, Milestone Systems, Editor's Choice, Surveillance, Integrated Solutions
A person or organisation with malicious intent can harm or sabotage a VMS system in several ways. This means that people or assets could be at risk.

Read more...
Cybersecurity: an electronic security distributor’s view
CCTV Handbook 2017, Johnson Controls - (Tyco Security Products), Editor's Choice, Surveillance
Over 79% of South African internet users who have lost money at the hands of cyber criminals have only got some, or none, of their stolen funds back.

Read more...
Weaponised IoT attacks: what does the future hold?
CCTV Handbook 2017, Editor's Choice
The first Mirai attack was a portend of the new, dark era in cybercrime and the physical security industry is right in the middle.

Read more...
Cybersecurity starts with the manufacturer
CCTV Handbook 2017, Johnson Controls - (Tyco Security Products), Surveillance
In the physical security industry, the perception is often that cybersecurity is someone else’s problem. From the end-user’s perspective, the integrator is required to install and configure equipment ...

Read more...
Intelligence and monitoring
March 2017, DCC Techhnologies, Duxbury Networking, Editor's Choice, Access Control & Identity Management, Infrastructure
Understanding the threats you face and your vulnerabilities is a starting point for securing your network.

Read more...
J2 Cyber Security Centre launched
March 2017, News & Events
J2 Software has announced the launch of its Cyber Security Centre (CSC) which is now commercially available to support businesses focused on improving information security and governance.

Read more...
Solving the skills shortage, ­supporting the industry
March 2017, Editor's Choice, Training & Education
One local company in the cyber security world has been stung by the skills shortage, but has made a plan to resolve the situation.

Read more...
Adapt or be hacked
March 2017, Infrastructure
Get the foundation right by deploying architectures that customers can lean on to deploy new technologies that will work effectively together.

Read more...
Machine-learning for defence
March 2017, Infrastructure, Products & Solutions
Trend Micro Network Defense brought to new levels of smart detection and rapid response.

Read more...
AVeS appoints new MD
1 March 2017, News & Events
Professional IT services consultancy AVeS Cyber Security has appointed Cecil Munsamy as its new managing director.

Read more...
Don’t pay the ransom
1 March 2017, Editor's Choice
How to prevent ransomware infections and what to do if you can’t.

Read more...
Uncloaking corruption within encryption
1 March 2017
Securing valuable data flow between applications is essential for safeguarding identity and helping communications between a web browser and a server to remain private.

Read more...
Authlogics appoints AxizWorkgroup as a distributor in Africa
February 2017, News & Events, Infrastructure
Multi-factor authentication company Authlogics has announced that AxizWorkgroup is its first local distributor and will deliver authentication solutions to resellers in Africa.

Read more...
Dealing with the insider threat
February 2017, Infrastructure
Teramind has developed a range of solutions to combat the insider threat. The solutions are available either as a hosted or on-site system.

Read more...
Protection from ransomware
February 2017, Infrastructure
With some careful preparation, you can significantly lower your risk of being infected by ransomware, and reduce the impact if you are hit.

Read more...
Defining African communications
February 2017, Technews Publishing, Infrastructure
Hi-Tech Security Solutions was present at AfricaCom to witness the vast resources being poured into improving the communications capabilities of the continent.

Read more...
Clues are dead
1 February 2017, News & Events
Kaspersky Lab’s discovery in 2016 of an APT able to create new tools for each victim has effectively killed off ‘Indicators of Compromise’ as a reliable means of detecting infection.

Read more...



<< First   < Previous   Page 47 of 87   Next >   Last >>








While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.