Information Security



10-Port PoE+ full gigabit managed switch
November 2015, Products & Solutions, Infrastructure
Antaira Technologies’ LMP-1002G-SFP and LMP-1002G-SFP-24 series are cost-effective 10-port industrial gigabit PoE+ managed Ethernet switches.

Read more...
Banking malware grows
1 November 2015, Integrated Solutions
South Africa is well known for its concentration of financial resources and any region that transacts using the English language or deemed as affluent is always high on the target list for the adversaries.

Read more...
Protecting the Wiegand protocol from attack
Access & Identity Management Handbook 2015, Access Control & Identity Management
In these attacks, a credential’s identifier is cloned, or captured, and is then retransmitted via a small electronic device to grant unauthorised access to an office or other facility.

Read more...
Leveraging ERP investment with WFM
Access & Identity Management Handbook 2015, Access Control & Identity Management
Many companies have an enterprise resource planning (ERP) system in place but fail to leverage its potential for saving them manpower costs and boosting produc­tivity.

Read more...
The new security perimeter
Access & Identity Management Handbook 2015, Access Control & Identity Management
CA Southern Africa’s Security B.U. manager, Michael Horn, expands on the new security perimeter and how ID and access management ensure the business environment is protected against outside intruders.

Read more...
Managing identities across the ­organisation
Access & Identity Management Handbook 2015, Access Control & Identity Management
Identity management (IDM) is essentially the management and administration of individual identities within a system, such as a business or a network.

Read more...
Five reasons for IT to get ­physical with access control
Access & Identity Management Handbook 2015, Access Control & Identity Management
While many network security systems are now built to support IT best practices and standards, such as, virtualisation, physical access control systems (PACS) have traditionally been designed without IT professionals in mind.

Read more...
Increased complexity complicates identity management
Access & Identity Management Handbook 2015, Access Control & Identity Management
Mobile identity and access management services can help organisations ensure ­security in the digital revolution.

Read more...
P@$$wORD_1: How secure is your password?
Access & Identity Management Handbook 2015, Access Control & Identity Management
One of the simplest means of acquiring this information, for an attacker, is to enter an organisation with the key to the door itself, users’ passwords.

Read more...
The what, who and why of RBAC
Access & Identity Management Handbook 2015, Access Control & Identity Management
In the world of identity and access management, Role-Based Access Control is gradually becoming a frequently used term.

Read more...
Data security in an insecure world
1 October 2015, Integrated Solutions
Copiers retain sensitive data on their built-in hard drives creating security risks due to the potential for malicious retrieval.

Read more...
Cisco 2015 Midyear Security Report
1 October 2015, Integrated Solutions
Cisco midyear security report highlights need for organisations in South Africa to invest in integrated technologies to reduce time to detection and remediation to a matter of hours amid a spate of sophisticated cyber attacks.

Read more...
Passport to identity crisis
September 2015, iFacts, Editor's Choice, Access Control & Identity Management, News & Events
Scores of South Africans woke up to a disturbing reality recently when the British High Commission contacted them to say that their UK Visa Applications, together with all supporting documentation, had ...

Read more...
Cloud-based identity management solution
September 2015, Access Control & Identity Management, Integrated Solutions
Networks Unlimited has introduced Centrify Privilege Service (CPS), a cloud-based identity management solution that addresses today’s growing gap in security, visibility and control over privileged accounts, ...

Read more...
Wireless the weakest security link
1 September 2015
The wireless network is the weakest security link in enterprise IT infrastructure. Nine in 10 CIOs report concerns over insufficient wireless protection; over one-third of enterprises found lacking basic wireless security.

Read more...
Protect your scada systems
1 September 2015, Industrial (Industry)
Check Point delivers scada security solutions to protect industrial control systems against cyber threats. New hardened security appliance with scada security for critical infrastructure.

Read more...
Stopping the next cyber attack
August 2015, Infrastructure
Doros Hadjizenonos, country manager of Check Point South Africa, explains how organisations can mitigate threats and how SA compares to the rest of Africa when it comes to cyber crime.

Read more...
18% of South Africans lost ­backup copies
August 2015, Infrastructure
A joint survey by Kaspersky Lab and B2B International has found that 18% of South African users surveyed who kept backup copies of their data on physical media eventually lost these copies.

Read more...
BlackBerry acquiring AtHoc
1 August 2015, News & Events
BlackBerry and AtHoc to connect communities, devices and organisations for real time communication.

Read more...
Surveillance systems under attack
1 July 2015
Security examination of a working city video surveillance system by Kaspersky Lab has revealed that networks designed to help protect people from criminals and terrorists could be misused by a third party exploiting system configuration flaws.

Read more...



<< First   < Previous   Page 51 of 86   Next >   Last >>








While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.