Information Security



Keeping data secure
April 2014
With the ongoing trend to move data offsite on mobile devices, can we truly find ways of ensuring that this data is secure from prying hands and eyes? And is data security for mobile devices different from that for supposedly office- or home-bound data?

Read more...
Mobile security from the cloud
April 2014
Despite the widely publicised losses resulting from targeted attacks, many SMBs have not taken action to address mobile device security. Research Now found that fewer than half of the enterprises surveyed had implemented a security solution.

Read more...
Cybersecurity in The Surveillance Age
April 2014
Strong encryption guards against data integrity compromises, which are typically treated by network engineers or mobile security experts as hostile and untrustworthy.

Read more...
New Titanium Backup Appliance
April 2014
Attix5, a data protection software and cloud solution provider, has announced the release of the Titanium Appliance, a complete onsite backup and recovery solution preinstalled with Attix5 software.

Read more...
Protecting critical data
April 2014
Quartile Capital ensures sensitive client information is encrypted and secured, by unifying data protection and backup across physical and virtual environments.

Read more...
POPI is here: start getting compliant
April 2014
E-mail security, archiving, and data loss prevention should be high on the agenda for South African companies in 2014 with PoPI around the corner.

Read more...
Over the NSA spying hype? Don’t be
April 2014
Hybrid cloud solutions – a mix of the best services provided by an outside environment and an internal infrastructure – are the latest buzzword. But even as they are touted as a ‘best of both worlds’ solution, they come with their own concerns.

Read more...
What’s inside Pandora’s box?
April 2014, iFacts
Cybercrime doesn’t just happen to large corporations. Small businesses are increasingly becoming prey for hackers, espionage, online fraud and social engineering. It is a growing and pervasive plague across the world.

Read more...
Keep control over your data
March 2014
Safesync provides enhanced data protection features such as DLP, persistent file encryption and document tagging, and is touted as a secure alternative to cloud based file sharing solutions such as DropBox.

Read more...
Costly content at risk
March 2014
The average cost of multimedia files that a user might lose from a device as a result of a cyber attack or other damage is estimated at $418, according to a Consumer Security Risks Survey, conducted by B2B International and Kaspersky Lab.

Read more...
Don’t be a hostage to ransomware
February 2014
Latest-generation ransomware can permanently encrypt business files, unless you pay to free them. Doros Hadjizenonos, sales manager at Check Point South Africa, takes a look at how ransomware is on the rise, and how firms can defend their data against being taken hostage.

Read more...
TSB Sugar RSA feeling sweet
February 2014
Kaspersky Lab has signed a three-year deal with TSB Sugar RSA to protect 1200 endpoints with Kaspersky Endpoint Security for Business.

Read more...
Palm vein authentication on mobile workstation
February 2014, Products & Solutions, Access Control & Identity Management
Fujitsu has introduced a highly-reliable and hygienic palm vein authentication to a mobile workstation.

Read more...
Cost per cybercrime victim up 50 per cent
February 2014
2013 Norton Report: Consumers sleeping with their smartphones and tablets, but failing to use protection.

Read more...
Mobility: freedom or failure
February 2014
A Channel 4 News special investigation, in association with MWR InfoSecurity, has revealed some startling information: In 24 hours a smartphone can send 350 000 packets of personal information and contact 350 servers worldwide.

Read more...
Storm warning: Business ­continuity and the cloud
1 February 2014
Cloud services are proliferating because they offer tremendous flexibility, but it could be a security and business-continuity disaster if not handled correctly.

Read more...
Small business is risky business
1 January 2014
A survey conducted by PricewaterhouseCoopers in 2013 for the U.K. Department for Business Innovation & Skills, found a 76% increase with the number of breaches in small and medium size firms.

Read more...
ESET launches Smart Security 7
January 2014, Products & Solutions
ESET Southern Africa has announced the launch of the 7th edition of its flagship online security products, ESET Smart Security and ESET NOD32 Antivirus. The new social media scanner feature protects local Facebook and Twitter users and their friends and followers from cyber threats.

Read more...
Exposing the cyber crime underground
January 2014
Cyber criminal activity in Africa a reality for businesses and consumers alike, says KPMG. Advances in technology across industries are yielding significant opportunities for cyber criminals, both organised and otherwise.

Read more...
Prevent Web application vulnerabilities
January 2014
the application architecture of the Internet was originally designed for sharing static information in a connectionless state, and not for traditional transaction-based applications.

Read more...



<< First   < Previous   Page 54 of 86   Next >   Last >>








While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.