Information Security



Great cyber security needs great people
October 2016, Editor's Choice, Infrastructure, Conferences & Events
Solutions are not reaching their full potential thanks to a dire shortage of cyber security professionals to harness them.

Read more...
Tyco strengthens reader-to-panel communications
October 2016, Johnson Controls - (Tyco Security Products), Access Control & Identity Management
C•CURE 9000 v2.50 event management platform now supports Open Supervised Device Protocol (OSDP), developed by the Security Industry Association (SIA) to allow for enhanced interoperability among security devices.

Read more...
New Milestone VMS
October 2016, Milestone Systems, Surveillance, Integrated Solutions, Products & Solutions
Milestone XProtect 2016 R3 Advanced VMS announced with focus on total cost of ownership, performance and cyber security – making video solutions more cost-effective through innovative new features.

Read more...
Social media: help or hindrance?
October 2016, Security Services & Risk Management
The proliferation of social media platforms must be seen as an advantage when it comes to crime prevention.

Read more...
Are you a whale?
October 2016, Infrastructure
Whaling attacks, also called Business Email Compromise, is a form of elaborate spear phishing, usually targeting C-level executives, i.e. the ‘big fish’.

Read more...
IoT: big opportunities, bigger challenges
October 2016, Integrated Solutions, Infrastructure
Much like cloud and mobility before it, the Internet of things (IoT) is a topic on everyone’s lips, and nowhere is this truer than in the security industry.

Read more...
80/20 rule for cyber crime
October 2016, Security Services & Risk Management
Cyber criminals focus 80% of their efforts on the 20% of IT environment neglected by companies.

Read more...
Threats businesses need to know about
October 2016
Some of the most dangerous threats to enterprises come in the form of targeted attacks – including stealthy advanced persistent threats (APTs).

Read more...
Understanding the Cybercrimes Bill
October 2016
The aim of the Cybercrimes and Cybersecurity Bill (Cybercrimes Bill) is to stop cybercrime and to improve security for South African citizens.

Read more...
Arteco integration with Contact-ID
September 2016, News & Events, Surveillance
Arteco has announced the integration of Arteco’s suite of video event management software (VEMS) with Contact-ID, an alarm protocol for intrusion, fire and building automation alarm systems.

Read more...
The fourth Industrial Revolution
September 2016, Industrial (Industry), Integrated Solutions, Infrastructure
Industry 4.0 also opens up a number of new security concerns as a multitude of new connected sensors and devices are added to the corporate network.

Read more...
Responding to a data breach
August 2016, Editor's Choice
An immediate and effective response to a data breach improves a company’s ability to regain trust, rebuild and thrive.

Read more...
Is it your turn now?
August 2016, Technews Publishing, Editor's Choice
The Verizon 2016 Data Breach Investigations Report sheds light on common patterns cyber criminals use when attacking organisations – the majority of attacks fit into only nine patterns.

Read more...
New PCI access rules
1 August 2016, Security Services & Risk Management
The PCI (Payment Card Industry) Security Council has extended its requirements for multi-factor authentication to anyone who has access to credit card data.

Read more...
IndigoCube reseller of Outpost24
August 2016, News & Events, Products & Solutions
Outpost24, a supplier of vulnerability management solutions, has named IndigoCube as exclusive reseller of its software in Africa.

Read more...
RSA ups its identity game
August 2016, Access Control & Identity Management, Infrastructure
The new RSA SecurID Suite is an identity solution that combines the separate disciplines of access, governance, lifecycle and identity assurance, working together in harmony.

Read more...
Securing access and identity in a virtualised environment
August 2016, Integrated Solutions
Michael Horn, BU manager, security, CA Southern Africa, discusses the challenges of virtual environments and security.

Read more...
Shortage in cyber security talent
August 2016
New report by Intel Security and CSIS reveals that the shortage in cyber security skills has done direct and measurable damage to companies’ reputation and loss of proprietary data.

Read more...
Six principles of resilience to manage digital security
August 2016, Security Services & Risk Management
How can security professionals in South Africa protect their organisations when hackers beat two person authentication methods and highjacked authenticated sessions?

Read more...
Calling for the cloud
August 2016, Infrastructure
Gartner predicts that by 2020, the stance against cloud technology will be as rare as the long-gone stance against the Internet, and adoption will be standard.

Read more...



<< First   < Previous   Page 47 of 85   Next >   Last >>








While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.