Information Security



Who else is using your servers?
July 2016
Kaspersky Lab exposes massive underground market selling over 70 000 hacked servers, with South Africa in the top 10.

Read more...
Effective cloud security
July 2016, Guardian Eye, Surveillance
Mayleen Bywater, senior product manager for security solutions at Vox Telecom discusses cloud security services.

Read more...
Kaspersky to detect targeted attacks
July 2016, Editor's Choice
Kaspersky Lab announced a major expansion of its enterprise security product portfolio with a solution designed to detect targeted attacks: The Kaspersky Anti Targeted Attack Platform.

Read more...
Tyco unveils Cyber Protection Programme
July 2016, Johnson Controls - (Tyco Security Products), Products & Solutions
Tyco's Cyber Protection Programme highlights companies understanding of holistic approach to reduce the risk of cyber vulnerability of physical security systems.

Read more...
Virtual network
July 2016, Salto Systems Africa, Products & Solutions, Access Control & Identity Management
SALTO’s Virtual Network (SVN) is the first in the world to have data programmed into the card technology.

Read more...
Data breach readiness
June 2016, Editor's Choice
This is the first of three articles on data breach readiness: Incident response and reputation protection plans are the key components of data breach management.

Read more...
Ignorance is a criminal’s best friend
June 2016
One-in-five could be signing away their privacy when they install a new app, Kaspersky Lab’s quiz shows.

Read more...
Guiding businesses through testing times
June 2016, Security Services & Risk Management
New BT security consulting offer to guide businesses through testing times. Cyber Roadmap Consulting identifies weaknesses and recommends ways to strengthen security.

Read more...
Cyber threats faced by the financial sector
May 2016, Editor's Choice
MWR’s research has uncovered six different types of threat actor, each with their own methods, context and incentives, but all similar.

Read more...
Hook, line and sinker
May 2016, Editor's Choice
If whaling is the new phishing, here’s how to protect your organisation’s big phish.

Read more...
Taking risk out of the payments channel
May 2016
Online security breaches are becoming the order of the day and such incidences are set to rise as the economy comes under increasing pressure.

Read more...
When advertising becomes dangerous
May 2016, Editor's Choice
“Leveraging an attack through a supplier proves an easier path to success than a direct attack on the intended victim.”

Read more...
Surviving in the IoT world
May 2016
Taking a random selection of the latest Internet-of-Things (IoT) products, Kaspersky Lab researchers have discovered serious threats to the connected home.

Read more...
Securing your security systems
CCTV Handbook 2016, Surveillance
Today’s cyber criminals are easily able to exploit unprotected surveillance cameras and other hardware to break into an organisation’s network.

Read more...
Is your CCTV system secure from cyber attack?
CCTV Handbook 2016, Surveillance, Editor's Choice
Visual surveillance is more integral to society than ever before, helping organisations to safeguard their most valuable assets. However, the DVR systems traditionally employed in CCTV networks can make those very organisations vulnerable.

Read more...
Privacy and visitor management
April 2016, Impro Technologies, Ideco Biometrics, iPulse Systems, Editor's Choice, Access Control & Identity Management, Integrated Solutions, Infrastructure
The right to privacy and the guarantee thereof is becoming more important in visitor management, and penalties for neglecting this issue will soon be enforceable.

Read more...
Digitally transforming identity ­relationships
April 2016, Editor's Choice, Access Control & Identity Management
A reliable digital identity determines the success of corporate digital transformation projects.

Read more...
Fortinet strengthens African presence
April 2016, News & Events
Fortinet has further invested in the African market through the appointments of three new members.

Read more...
Integrated security key
April 2016, Editor's Choice
South African companies need to automate and integrate their IT security solutions to meet increasingly sophisticated threats, writes Intel Security’s Trevor Coetzee.

Read more...
Why your cloud app should be SAML-enabled
April 2016
David Meyer, VP of product at OneLogin discusses the benefits of SAML (Security Assertion Markup Language).

Read more...



<< First   < Previous   Page 48 of 85   Next >   Last >>








While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.