Information Security



Data breach readiness
June 2016, Editor's Choice
This is the first of three articles on data breach readiness: Incident response and reputation protection plans are the key components of data breach management.

Read more...
Ignorance is a criminal’s best friend
June 2016
One-in-five could be signing away their privacy when they install a new app, Kaspersky Lab’s quiz shows.

Read more...
Guiding businesses through testing times
June 2016, Security Services & Risk Management
New BT security consulting offer to guide businesses through testing times. Cyber Roadmap Consulting identifies weaknesses and recommends ways to strengthen security.

Read more...
Cyber threats faced by the financial sector
May 2016, Editor's Choice
MWR’s research has uncovered six different types of threat actor, each with their own methods, context and incentives, but all similar.

Read more...
Hook, line and sinker
May 2016, Editor's Choice
If whaling is the new phishing, here’s how to protect your organisation’s big phish.

Read more...
Taking risk out of the payments channel
May 2016
Online security breaches are becoming the order of the day and such incidences are set to rise as the economy comes under increasing pressure.

Read more...
When advertising becomes dangerous
May 2016, Editor's Choice
“Leveraging an attack through a supplier proves an easier path to success than a direct attack on the intended victim.”

Read more...
Surviving in the IoT world
May 2016
Taking a random selection of the latest Internet-of-Things (IoT) products, Kaspersky Lab researchers have discovered serious threats to the connected home.

Read more...
Securing your security systems
CCTV Handbook 2016, Surveillance
Today’s cyber criminals are easily able to exploit unprotected surveillance cameras and other hardware to break into an organisation’s network.

Read more...
Is your CCTV system secure from cyber attack?
CCTV Handbook 2016, Surveillance, Editor's Choice
Visual surveillance is more integral to society than ever before, helping organisations to safeguard their most valuable assets. However, the DVR systems traditionally employed in CCTV networks can make those very organisations vulnerable.

Read more...
Privacy and visitor management
April 2016, Impro Technologies, Ideco Biometrics, iPulse Systems, Editor's Choice, Access Control & Identity Management, Integrated Solutions, Infrastructure
The right to privacy and the guarantee thereof is becoming more important in visitor management, and penalties for neglecting this issue will soon be enforceable.

Read more...
Digitally transforming identity ­relationships
April 2016, Editor's Choice, Access Control & Identity Management
A reliable digital identity determines the success of corporate digital transformation projects.

Read more...
Fortinet strengthens African presence
April 2016, News & Events
Fortinet has further invested in the African market through the appointments of three new members.

Read more...
Integrated security key
April 2016, Editor's Choice
South African companies need to automate and integrate their IT security solutions to meet increasingly sophisticated threats, writes Intel Security’s Trevor Coetzee.

Read more...
Why your cloud app should be SAML-enabled
April 2016
David Meyer, VP of product at OneLogin discusses the benefits of SAML (Security Assertion Markup Language).

Read more...
Technology is not a silver bullet
April 2016
Cyber security is no longer an IT problem but rather an organisational priority. Unfortunately, there is no silver bullet against cyber onslaughts and implementing the right technology won’t cut it.

Read more...
Service provider got you hacked?
April 2016, Johnson Controls - (Tyco Security Products)
Have you ever asked if your security system provider is protecting your data from cyber attacks?

Read more...
Containing cyber security risks
1 April 2016, Conferences & Events
The most important cost of cybercrime comes from its damage to company performance and to national economies. Cybercrime damages trade, competitiveness, innovation, and global economic growth.

Read more...
Is security the missing link?
1 April 2016
The World Economic Forum (WEF) expects the Internet of Things (IoT) to eliminate more than 50 million jobs in the next five years as technology automates more day-to-day tasks.

Read more...
When, not if
March 2016, Editor's Choice, Security Services & Risk Management
What is one of the top worries of C-suite executives these days? Whether or not their company can survive a database breach.

Read more...



<< First   < Previous   Page 49 of 86   Next >   Last >>








While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.