Information Security



IoT: big opportunities, bigger challenges
October 2016, Integrated Solutions, Infrastructure
Much like cloud and mobility before it, the Internet of things (IoT) is a topic on everyone’s lips, and nowhere is this truer than in the security industry.

Read more...
80/20 rule for cyber crime
October 2016, Security Services & Risk Management
Cyber criminals focus 80% of their efforts on the 20% of IT environment neglected by companies.

Read more...
Threats businesses need to know about
October 2016
Some of the most dangerous threats to enterprises come in the form of targeted attacks – including stealthy advanced persistent threats (APTs).

Read more...
Understanding the Cybercrimes Bill
October 2016
The aim of the Cybercrimes and Cybersecurity Bill (Cybercrimes Bill) is to stop cybercrime and to improve security for South African citizens.

Read more...
Arteco integration with Contact-ID
September 2016, News & Events, Surveillance
Arteco has announced the integration of Arteco’s suite of video event management software (VEMS) with Contact-ID, an alarm protocol for intrusion, fire and building automation alarm systems.

Read more...
The fourth Industrial Revolution
September 2016, Industrial (Industry), Integrated Solutions, Infrastructure
Industry 4.0 also opens up a number of new security concerns as a multitude of new connected sensors and devices are added to the corporate network.

Read more...
Responding to a data breach
August 2016, Editor's Choice
An immediate and effective response to a data breach improves a company’s ability to regain trust, rebuild and thrive.

Read more...
Is it your turn now?
August 2016, Technews Publishing, Editor's Choice
The Verizon 2016 Data Breach Investigations Report sheds light on common patterns cyber criminals use when attacking organisations – the majority of attacks fit into only nine patterns.

Read more...
New PCI access rules
1 August 2016, Security Services & Risk Management
The PCI (Payment Card Industry) Security Council has extended its requirements for multi-factor authentication to anyone who has access to credit card data.

Read more...
IndigoCube reseller of Outpost24
August 2016, News & Events, Products & Solutions
Outpost24, a supplier of vulnerability management solutions, has named IndigoCube as exclusive reseller of its software in Africa.

Read more...
RSA ups its identity game
August 2016, Access Control & Identity Management, Infrastructure
The new RSA SecurID Suite is an identity solution that combines the separate disciplines of access, governance, lifecycle and identity assurance, working together in harmony.

Read more...
Securing access and identity in a virtualised environment
August 2016, Integrated Solutions
Michael Horn, BU manager, security, CA Southern Africa, discusses the challenges of virtual environments and security.

Read more...
Shortage in cyber security talent
August 2016
New report by Intel Security and CSIS reveals that the shortage in cyber security skills has done direct and measurable damage to companies’ reputation and loss of proprietary data.

Read more...
Six principles of resilience to manage digital security
August 2016, Security Services & Risk Management
How can security professionals in South Africa protect their organisations when hackers beat two person authentication methods and highjacked authenticated sessions?

Read more...
Calling for the cloud
August 2016, Infrastructure
Gartner predicts that by 2020, the stance against cloud technology will be as rare as the long-gone stance against the Internet, and adoption will be standard.

Read more...
Who else is using your servers?
July 2016
Kaspersky Lab exposes massive underground market selling over 70 000 hacked servers, with South Africa in the top 10.

Read more...
Effective cloud security
July 2016, Guardian Eye, Surveillance
Mayleen Bywater, senior product manager for security solutions at Vox Telecom discusses cloud security services.

Read more...
Kaspersky to detect targeted attacks
July 2016, Editor's Choice
Kaspersky Lab announced a major expansion of its enterprise security product portfolio with a solution designed to detect targeted attacks: The Kaspersky Anti Targeted Attack Platform.

Read more...
Tyco unveils Cyber Protection Programme
July 2016, Johnson Controls - (Tyco Security Products), Products & Solutions
Tyco's Cyber Protection Programme highlights companies understanding of holistic approach to reduce the risk of cyber vulnerability of physical security systems.

Read more...
Virtual network
July 2016, Salto Systems Africa, Products & Solutions, Access Control & Identity Management
SALTO’s Virtual Network (SVN) is the first in the world to have data programmed into the card technology.

Read more...



<< First   < Previous   Page 48 of 86   Next >   Last >>








While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.