Information Security



Arteco integration with Contact-ID
September 2016, News & Events, Surveillance
Arteco has announced the integration of Arteco’s suite of video event management software (VEMS) with Contact-ID, an alarm protocol for intrusion, fire and building automation alarm systems.

Read more...
The fourth Industrial Revolution
September 2016, Industrial (Industry), Integrated Solutions, Infrastructure
Industry 4.0 also opens up a number of new security concerns as a multitude of new connected sensors and devices are added to the corporate network.

Read more...
Responding to a data breach
August 2016, Editor's Choice
An immediate and effective response to a data breach improves a company’s ability to regain trust, rebuild and thrive.

Read more...
Is it your turn now?
August 2016, Technews Publishing, Editor's Choice
The Verizon 2016 Data Breach Investigations Report sheds light on common patterns cyber criminals use when attacking organisations – the majority of attacks fit into only nine patterns.

Read more...
New PCI access rules
1 August 2016, Security Services & Risk Management
The PCI (Payment Card Industry) Security Council has extended its requirements for multi-factor authentication to anyone who has access to credit card data.

Read more...
IndigoCube reseller of Outpost24
August 2016, News & Events, Products & Solutions
Outpost24, a supplier of vulnerability management solutions, has named IndigoCube as exclusive reseller of its software in Africa.

Read more...
RSA ups its identity game
August 2016, Access Control & Identity Management, Infrastructure
The new RSA SecurID Suite is an identity solution that combines the separate disciplines of access, governance, lifecycle and identity assurance, working together in harmony.

Read more...
Securing access and identity in a virtualised environment
August 2016, Integrated Solutions
Michael Horn, BU manager, security, CA Southern Africa, discusses the challenges of virtual environments and security.

Read more...
Shortage in cyber security talent
August 2016
New report by Intel Security and CSIS reveals that the shortage in cyber security skills has done direct and measurable damage to companies’ reputation and loss of proprietary data.

Read more...
Six principles of resilience to manage digital security
August 2016, Security Services & Risk Management
How can security professionals in South Africa protect their organisations when hackers beat two person authentication methods and highjacked authenticated sessions?

Read more...
Calling for the cloud
August 2016, Infrastructure
Gartner predicts that by 2020, the stance against cloud technology will be as rare as the long-gone stance against the Internet, and adoption will be standard.

Read more...
Who else is using your servers?
July 2016
Kaspersky Lab exposes massive underground market selling over 70 000 hacked servers, with South Africa in the top 10.

Read more...
Effective cloud security
July 2016, Guardian Eye, Surveillance
Mayleen Bywater, senior product manager for security solutions at Vox Telecom discusses cloud security services.

Read more...
Kaspersky to detect targeted attacks
July 2016, Editor's Choice
Kaspersky Lab announced a major expansion of its enterprise security product portfolio with a solution designed to detect targeted attacks: The Kaspersky Anti Targeted Attack Platform.

Read more...
Tyco unveils Cyber Protection Programme
July 2016, Johnson Controls - (Tyco Security Products), Products & Solutions
Tyco's Cyber Protection Programme highlights companies understanding of holistic approach to reduce the risk of cyber vulnerability of physical security systems.

Read more...
Virtual network
July 2016, Salto Systems Africa, Products & Solutions, Access Control & Identity Management
SALTO’s Virtual Network (SVN) is the first in the world to have data programmed into the card technology.

Read more...
Data breach readiness
June 2016, Editor's Choice
This is the first of three articles on data breach readiness: Incident response and reputation protection plans are the key components of data breach management.

Read more...
Ignorance is a criminal’s best friend
June 2016
One-in-five could be signing away their privacy when they install a new app, Kaspersky Lab’s quiz shows.

Read more...
Guiding businesses through testing times
June 2016, Security Services & Risk Management
New BT security consulting offer to guide businesses through testing times. Cyber Roadmap Consulting identifies weaknesses and recommends ways to strengthen security.

Read more...
Cyber threats faced by the financial sector
May 2016, Editor's Choice
MWR’s research has uncovered six different types of threat actor, each with their own methods, context and incentives, but all similar.

Read more...



<< First   < Previous   Page 49 of 87   Next >   Last >>








While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.