Information Security



The IoT is already here – will you be secure?
1 September 2014
“We should question whether some of the great advancements in technology are designed to serve us or serve the interests of others.”

Read more...
Malicious malware and your business
1 September 2014
Businesses should be aware that their security system from last year might not be protected from today’s most common malware.

Read more...
A look into the cybercriminal underground
August 2014
Places in the Internet where cybercriminals converge to sell and buy different products and services exist. Like any other market, the laws of supply and demand dictate prices and feature offerings.

Read more...
Manager’s guide: Tailor-made security policy
August 2014
With the never ending number of security threats to business information it is imperative that managers take the initiative to establish working and evolving security policies that protect the business and its assets.

Read more...
Practicing good information ­governance
August 2014
The exponential growth of data, combined with increasing regulation, has left many organisations struggling with the complexity of compliance required to manage their information.

Read more...
Worldwide security software market grew 4.9% in 2013
July 2014
Worldwide security software revenue totalled $19.9 billion in 2013, a 4.9% increase from 2012 revenue of $19.0 billion, according to Gartner.

Read more...
Securing enterprise cloud applications
1 July 2014, HID Global
With data now living on the wrong side of conventional internal defences in cloud-based server farms, the ground has shifted and a one-size-fits-all approach to data protection is not sufficient.

Read more...
Public sector in the cloud
1 July 2014
The public sector is displaying a newfound openness towards cloud delivery models, believes Andrew Soddy of Mimecast.

Read more...
Consistent malware protection
1 July 2014
Cisco expands advanced malware protection and data centre security solutions to address advanced threats from endpoint to network to cloud for customers in South Africa.

Read more...
Business should anticipate greater cloud cover
1 July 2014
A reduction in the cost of data and reliability of data on fixed line and wireless media has driven more widespread use of cloud services.

Read more...
Hosting in the cloud
1 July 2014
Scalability, flexibility, security and cost saving are just some of the benefits associated with a move from traditional on-premise servers to a cloud-based environment – and the business case for initiating the process is clear and strong.

Read more...
Security in the cloud
1 July 2014
Panda Security has announced the availability of its new cloud offering, Panda Cloud Fusion, which combines comprehensive security, management and support in one solution.

Read more...
How hackers are stealing ­company secrets
1 July 2014, Security Services & Risk Management
Common, everyday applications Facebook, YouTube, Flickr etc. can be used to transfer sensitive data out of your organisation with ease.

Read more...
POPI demands control over mobile data
1 July 2014
The Protection of Personal Information Act (POPI) should prompt a mobile security rethink for SA companies.

Read more...
Securing mobile communication services
1 July 2014
A new player is entering the market, offering the solution to mobile security concerns.

Read more...
Patience is a criminal virtue
1 June 2014
Symantec report reveals the number of mega data breaches went from one in 2012 to eight in 2013; 552 million identities exposed in 2013.

Read more...
Advanced evasion techniques prove costly
1 May 2014
Research commissioned by McAfee examines the role and cost of advanced evasion techniques in recent high profile data breaches.

Read more...
When, not if
1 May 2014
Cisco introduces Advanced Malware Protection to protect its 60 million enterprise and commercial users of Web, e-mail and cloud Web security solutions.

Read more...
On-premise security doesn’t make sense
1 May 2014
Though using separate best-of-breed, on-premise solutions for different security problems remains the dominant approach for deploying IT security, recent research by Osterman Research shows that companies would prefer a single or cloud-based approach.

Read more...
Effective website security
May 2014
Websites have been using SSL technology for years to ensure their security, and the certificates and their uses are well understood. SSL that only protects users at login, however, leaves them vulnerable when they’re spending time on your website.

Read more...



<< First   < Previous   Page 53 of 86   Next >   Last >>








While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.