Information Security



Technology is not a silver bullet
April 2016
Cyber security is no longer an IT problem but rather an organisational priority. Unfortunately, there is no silver bullet against cyber onslaughts and implementing the right technology won’t cut it.

Read more...
Service provider got you hacked?
April 2016, Johnson Controls - (Tyco Security Products)
Have you ever asked if your security system provider is protecting your data from cyber attacks?

Read more...
Containing cyber security risks
1 April 2016, Conferences & Events
The most important cost of cybercrime comes from its damage to company performance and to national economies. Cybercrime damages trade, competitiveness, innovation, and global economic growth.

Read more...
Is security the missing link?
1 April 2016
The World Economic Forum (WEF) expects the Internet of Things (IoT) to eliminate more than 50 million jobs in the next five years as technology automates more day-to-day tasks.

Read more...
When, not if
March 2016, Editor's Choice, Security Services & Risk Management
What is one of the top worries of C-suite executives these days? Whether or not their company can survive a database breach.

Read more...
Uber accounts for sale
1 March 2016, News & Events
Trend Micro found that Uber accounts are worth more on the Deep Web than stolen credit card information.

Read more...
TFG upgrades identity ­management
March 2016, Retail (Industry), Access Control & Identity Management
Leading SA retailer enhances competitiveness through deployment of CA Technologies’ security solution, expects to reduce costs and improve business efficiencies while streamlining compliance.

Read more...
Data centre security
March 2016, Access Control & Identity Management
Key management systems offer proactive approach to data centre security.

Read more...
Cyber security outlook
February 2016, Technews Publishing, Editor's Choice
Hi-Tech Security Solutions takes a brief look at what’s happening in the world of ­cyber security going into 2016.

Read more...
It’s not you, it’s me
February 2016
Despite the rapid growth of cloud services, security is still the number one concern for business owners migrating their workloads to the cloud.

Read more...
Integrated technology critical to success
February 2016, Integrated Solutions
While various technologies continue to evolve and are being implemented today, the real impact will only be seen when analytics allow them to be combined in real-time, with some artificial intelligence behind it.

Read more...
Mobile app survey
February 2016
In November 2015, Arxan commissioned a survey on the security of mobile apps widely available in the market today. These are the results.

Read more...
Cloud-based IAM solution
February 2016, News & Events
OneLogin enhances its cloud-based IAM solution for enterprises with hybrid on-premise and cloud environments through acquisition of Cafésoft.

Read more...
Smart cities will use 1.6 billion connected things in 2016
February 2016, News & Events
Gartner, Inc. estimates that 1.6 billion connected things will be used by smart cities in 2016, an increase of 39% from 2015 (see Table 1).    “Smart commercial buildings will be the highest user of Internet ...

Read more...
Protect yourself
February 2016
Security software, processes and systems are not enough to beat cybercriminals. Cybercrime, overall, costs the country around R5,8bn annually.

Read more...
Africa in the cyber war
February 2016
The three most common malware types focus on remote control of infected PCs, enabling them to be used for launching DDoS and spam campaigns.

Read more...
The password conundrum
February 2016
Nearly half (42%) of Internet users in South Africa admit having shared their passwords with somebody or left them visible for people to see.

Read more...
Interconnecting physical and cyber security
February 2016, Integrated Solutions
As the lines between digital and physical realms blur, the weakest links are to be found where physical and information security meet.

Read more...
Is business the next target?
1 February 2016, News & Events
Ransomware is the latest tool in the cybercriminals arsenal, but to date, it has largely been used to target consumers.

Read more...
Business resilience in an uncertain world
1 February 2016, Security Services & Risk Management
First there was disaster recovery, then came business continuity and now companies are looking for ways to build business resilience.

Read more...



<< First   < Previous   Page 49 of 85   Next >   Last >>








While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.