Increased complexity complicates identity management Access & Identity Management Handbook 2015, Access Control & Identity Management Mobile identity and access management services can help organisations ensure security in the digital revolution.
P@$$wORD_1: How secure is your password? Access & Identity Management Handbook 2015, Access Control & Identity Management One of the simplest means of acquiring this information, for an attacker, is to enter an organisation with the key to the door itself, users’ passwords.
The what, who and why of RBAC Access & Identity Management Handbook 2015, Access Control & Identity Management In the world of identity and access management, Role-Based Access Control is gradually becoming a frequently used term.
Data security in an insecure world 1 October 2015, Integrated Solutions Copiers retain sensitive data on their built-in hard drives creating security risks due to the potential for malicious retrieval.
Cisco 2015 Midyear Security Report 1 October 2015, Integrated Solutions Cisco midyear security report highlights need for organisations in South Africa to invest in integrated technologies to reduce time to detection and remediation to a matter of hours amid a spate of sophisticated cyber attacks.
Passport to identity crisis September 2015, iFacts, Editor's Choice, Access Control & Identity Management, News & Events Scores of South Africans woke up to a disturbing reality recently when the British High Commission contacted them to say that their UK Visa Applications, together with all supporting documentation, had ...
Cloud-based identity management solution September 2015, Access Control & Identity Management, Integrated Solutions Networks Unlimited has introduced Centrify Privilege Service (CPS), a cloud-based identity management solution that addresses today’s growing gap in security, visibility and control over privileged accounts, ...
Wireless the weakest security link 1 September 2015 The wireless network is the weakest security link in enterprise IT infrastructure. Nine in 10 CIOs report concerns over insufficient wireless protection; over one-third of enterprises found lacking basic wireless security.
Protect your scada systems 1 September 2015, Industrial (Industry) Check Point delivers scada security solutions to protect industrial control systems against cyber threats. New hardened security appliance with scada security for critical infrastructure.
Stopping the next cyber attack August 2015, Infrastructure Doros Hadjizenonos, country manager of Check Point South Africa, explains how organisations can mitigate threats and how SA compares to the rest of Africa when it comes to cyber crime.
18% of South Africans lost backup copies August 2015, Infrastructure A joint survey by Kaspersky Lab and B2B International has found that 18% of South African users surveyed who kept backup copies of their data on physical media eventually lost these copies.
BlackBerry acquiring AtHoc 1 August 2015, News & Events BlackBerry and AtHoc to connect communities, devices and organisations for real time communication.
Surveillance systems under attack 1 July 2015 Security examination of a working city video surveillance system by Kaspersky Lab has revealed that networks designed to help protect people from criminals and terrorists could be misused by a third party exploiting system configuration flaws.
Hosted security services 1 July 2015, Security Services & Risk Management Cloud services can be useful, cost effective and beneficial, but take care of your security first. Michael Horn, BU manager for security at CA Southern Africa elaborates on being secure out in the great wide Internet.
Complete solution for three KZN schools July 2015, MiRO, Surveillance Three KZN schools opt for wireless networks for Internet access and security surveillance.
The increasing pace of technology advancement June 2015, News & Events, Editor's Choice The trouble with thinking about technology advancements is that the rate of past progress does not predict the rate of future progress.
Layered approach to prevent watering hole attacks 1 June 2015 A layered approach based on a combination of checks and balances, along with various key technologies, is the most comprehensive method of preventing so-called watering hole malware attacks.
Mobile content security and enterprise collaboration boosted 1 June 2015, Integrated Solutions BlackBerry announced that it has entered into a definitive agreement to acquire WatchDox to further enhance its mobile security and give enterprises control over their files even after data leaves the corporate network.
Driving PSIM through true SOA 1 June 2015, Surveillance In any PSIM deployment, the day-to-day information load is relatively minimal. The challenge is the response to a sudden surge in this load, caused by a critical event or disaster scenario, comprised of multiple events happening at the same time.
Stopping the leak May 2015 The damage that data loss can do to an inadequately secured enterprise extends far beyond pecuniary matters and can include reputation loss, regulatory consequences, a decrease in customer confidence, trust issues, a drop in market share, and the development of trade barriers.