Cloud-based IAM solution February 2016, News & Events OneLogin enhances its cloud-based IAM solution for enterprises with hybrid on-premise and cloud environments through acquisition of Cafésoft.
Smart cities will use 1.6 billion connected things in 2016 February 2016, News & Events Gartner, Inc. estimates that 1.6 billion connected things will be used by smart cities in 2016, an increase of 39% from 2015 (see Table 1).
“Smart commercial buildings will be the highest user of Internet ...
Protect yourself February 2016 Security software, processes and systems are not enough to beat cybercriminals. Cybercrime, overall, costs the country around R5,8bn annually.
Africa in the cyber war February 2016 The three most common malware types focus on remote control of infected PCs, enabling them to be used for launching DDoS and spam campaigns.
The password conundrum February 2016 Nearly half (42%) of Internet users in South Africa admit having shared their passwords with somebody or left them visible for people to see.
Interconnecting physical and cyber security February 2016, Integrated Solutions As the lines between digital and physical realms blur, the weakest links are to be found where physical and information security meet.
Is business the next target? 1 February 2016, News & Events Ransomware is the latest tool in the cybercriminals arsenal, but to date, it has largely been used to target consumers.
Business resilience in an uncertain world 1 February 2016, Security Services & Risk Management First there was disaster recovery, then came business continuity and now companies are looking for ways to build business resilience.
IoT, game-changing, but risky January 2016, Access Control & Identity Management The Internet of Things (IoT) is making its way into the surveillance industry, bringing with it security benefits and unforeseen risks.
Hyper-convergence and security January 2016, Infrastructure Hyper-convergence is taking the security industry by storm as it provides integrators and installers with more computing resources at a lower cost, that are also easier to manage.
Security predictions for 2016 January 2016, Editor's Choice Doros Hadjizenonos, country manager of Check Point South Africa, gives his security predictions for the coming year. But by anticipating the next wave of threats, businesses can stay on top of the evolving tactics and exploits that criminals will use.
ESET launches Smart Security 9 November 2015, News & Events, Products & Solutions ESET has announced the availability of its new security solutions for Windows home users: ESET Smart Security 9 and ESET NOD32 Antivirus 9.
The Internet of Things is the Land of Opportunity November 2015, Editor's Choice, Security Services & Risk Management The Internet of Things is happening now because two important drivers are in place: opportunity and necessity.
Banking malware grows 1 November 2015, Integrated Solutions South Africa is well known for its concentration of financial resources and any region that transacts using the English language or deemed as affluent is always high on the target list for the adversaries.
Protecting the Wiegand protocol from attack Access & Identity Management Handbook 2015, Access Control & Identity Management In these attacks, a credential’s identifier is cloned, or captured, and is then retransmitted via a small electronic device to grant unauthorised access to an office or other facility.
Leveraging ERP investment with WFM Access & Identity Management Handbook 2015, Access Control & Identity Management Many companies have an enterprise resource planning (ERP) system in place but fail to leverage its potential for saving them manpower costs and boosting productivity.
The new security perimeter Access & Identity Management Handbook 2015, Access Control & Identity Management CA Southern Africa’s Security B.U. manager, Michael Horn, expands on the new security perimeter and how ID and access management ensure the business environment is protected against outside intruders.
Managing identities across the organisation Access & Identity Management Handbook 2015, Access Control & Identity Management Identity management (IDM) is essentially the management and administration of individual identities within a system, such as a business or a network.
Five reasons for IT to get physical with access control Access & Identity Management Handbook 2015, Access Control & Identity Management While many network security systems are now built to support IT best practices and standards, such as, virtualisation, physical access control systems (PACS) have traditionally been designed without IT professionals in mind.