Information Security



Dealing with the insider threat
February 2017, Infrastructure
Teramind has developed a range of solutions to combat the insider threat. The solutions are available either as a hosted or on-site system.

Read more...
Protection from ransomware
February 2017, Infrastructure
With some careful preparation, you can significantly lower your risk of being infected by ransomware, and reduce the impact if you are hit.

Read more...
Defining African communications
February 2017, Technews Publishing, Infrastructure
Hi-Tech Security Solutions was present at AfricaCom to witness the vast resources being poured into improving the communications capabilities of the continent.

Read more...
Clues are dead
1 February 2017, News & Events
Kaspersky Lab’s discovery in 2016 of an APT able to create new tools for each victim has effectively killed off ‘Indicators of Compromise’ as a reliable means of detecting infection.

Read more...
Tough with opportunities
1 February 2017, Security & Communication Warehouse, Surveillance
Marius Stoop looks at what we can expect in the security industry in 2017.

Read more...
Cyber security in 2017
1 February 2017
Harish Chib, VP MEA for SOPHOS discusses some of the cyber security issues he expects to encounter in 2017.

Read more...
Control your own privacy
November 2016, Technews Publishing
Whether you know it or not, or whether you care or not, everything you do online is being tracked. TrackOFF protects you digital identity from fingerprinting and other nefarious online spies.

Read more...
The app effect on security
1 November 2016
While security teams focus on patching operating systems and web browsers, vulnerabilities in those two types of software typically account for a small amount of publicly disclosed vulnerabilities.

Read more...
Datacentrix revamps Security Operations Centre
1 November 2016, News & Events, Security Services & Risk Management
Datacentrix, a provider of high performing and secure ICT solutions, has officially launched its overhauled Security Operations Centre (SOC), unveiling a highly intelligent service that provides actionable information to help organisations respond to attacks faster and more efficiently.

Read more...
IT security drives business growth
November 2016, Editor's Choice, Access Control & Identity Management
South African businesses highlight a 30% percent increase in revenue from new business, while almost three-quarters agree identity-centric security is critical to the business.

Read more...
King IV looks at your data
November 2016, Security Services & Risk Management
The launch of the King IV Report on Corporate Governance by the Institute of Directors in Southern Africa on 1 November provides a wake-up call for South African organisations.

Read more...
Accessing cyber security
Access & Identity Management Handbook 2017, Johnson Controls - (Tyco Security Products), Editor's Choice, Access Control & Identity Management, Security Services & Risk Management
Tyco Security Products is taking a proactive role in securing its range of physical security products by developing its Cyber Protection Programme.

Read more...
Multi-modal security best for registered financial service providers
October 2016, Technews Publishing, Editor's Choice, Surveillance, Access Control & Identity Management, Integrated Solutions, Financial (Industry)
The financial sector faces a number of security challenges that range from outright banking hall robberies, through theft of money at ATMs, internal and external fraud, as well as phishing and similar cyber threats.

Read more...
After the data breach
October 2016, Editor's Choice, Security Services & Risk Management, Financial (Industry)
Lifars and Fortress Strategic Communications outline steps companies need to take after they contain the data breach and initiate the process of normalising business operations.

Read more...
Biometric skimmers are here
October 2016, Kaspersky, News & Events
According to a Kaspersky Lab investigation into underground cybercrime, there are already at least twelve sellers offering skimmers capable of stealing victims’ fingerprints.

Read more...
Great cyber security needs great people
October 2016, Editor's Choice, Infrastructure, Conferences & Events
Solutions are not reaching their full potential thanks to a dire shortage of cyber security professionals to harness them.

Read more...
Tyco strengthens reader-to-panel communications
October 2016, Johnson Controls - (Tyco Security Products), Access Control & Identity Management
C•CURE 9000 v2.50 event management platform now supports Open Supervised Device Protocol (OSDP), developed by the Security Industry Association (SIA) to allow for enhanced interoperability among security devices.

Read more...
New Milestone VMS
October 2016, Milestone Systems, Surveillance, Integrated Solutions, Products & Solutions
Milestone XProtect 2016 R3 Advanced VMS announced with focus on total cost of ownership, performance and cyber security – making video solutions more cost-effective through innovative new features.

Read more...
Social media: help or hindrance?
October 2016, Security Services & Risk Management
The proliferation of social media platforms must be seen as an advantage when it comes to crime prevention.

Read more...
Are you a whale?
October 2016, Infrastructure
Whaling attacks, also called Business Email Compromise, is a form of elaborate spear phishing, usually targeting C-level executives, i.e. the ‘big fish’.

Read more...



<< First   < Previous   Page 47 of 86   Next >   Last >>








While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.