Information Security



Managing mobile security in South Africa
August 2013
Sensitive corporate information can be easily transported, leaked, or lost while the Bring Your Own Device (BYOD) movement has dramatically increased the number of expensive security incidents.

Read more...
Big data comes to security
August 2013
RSA Silver Tail introduces big data visualisation and click-by-click threat scoring.

Read more...
Securing iOS and Android in the enterprise
August 2013
Secure Work Space separates work and personal apps and data on iOS and Android devices without sacrificing the user experience.

Read more...
The complex cloud security conundrum
July 2013, Technews Publishing
Hi-Tech Security Solutions delves into the complex and popular world of cloud computing with a view to understanding the security implications of this trend.

Read more...
Who is watching your data?
July 2013
Information theft is the most profitable crime in the world today.

Read more...
Emulating the enemy
July 2013
Threat emulation is a critical ­technique in achieving more effective network security. Doros Hadjizenonos, sales manager at Check Point South Africa explains why.

Read more...
Secure wireless LAN solution
July 2013, Products & Solutions
Fortinet has released its new secure wireless LAN solution specifically designed for distributed enterprises. The Fortinet Secure WLAN integrates wireless and wired access, security, authentication, switching ...

Read more...
Hardened video encoder/decoder
July 2013, Products & Solutions
ComNet Europe is introducing a video encoder/decoder designed for those applications where temperature extremes, vibration, shock, voltage transients, and humidity with condensation are present. The new CNVETX1 video encoder/decoder is industrially hardened for use in the most extreme operating environments.

Read more...
Of security and open source software
July 2013
When it comes to open source software … are you more or less secure?

Read more...
New model for consumer security
1 July 2013
McAfee launches unlimited cross-device security service with facial and voice recognition for consumer devices.

Read more...
Financial institutions gamble with information security
1 July 2013, Financial (Industry)
Lack of security specialists lead to high risk, quick fix security solutions.

Read more...
Mining the cloud for security
1 July 2013
Cloud-based solutions embracing endpoint protection, e-mail security and systems management.

Read more...
Security for small businesses
1 July 2013
New 600 appliances provide security solutions to protect small businesses against the latest cyber attacks.

Read more...
New information protection solution
1 July 2013
Xerox and McAfee team up to deliver a new level of data protection.

Read more...
Verifying identity is essential
1 July 2013
“Being able to verify identity is essential to ensure that you are transacting with and communicating to a legitimately recognised and intended recipient,” says LAWtrust certificate service manager Megan Rehbock.

Read more...
New protection from ESET
June 2013
ESET releases ESET NOD32 Antivirus 6 and ESET Smart Security 6 with Anti-Theft, a dedicated Anti-Phishing Module and ESET Social Media Scanner.

Read more...
MWEB Business extends security offering
June 2013
MWEB Business has extended its portfolio of security offerings with the introduction of Percol8.

Read more...
Authentication critical in cyber ­security
1 May 2013
The unfortunate reality is that while business leaders know they are at war, they are prepared to tackle a highly skilled and motivated enemy with inferior weapons and tactics.

Read more...
Transnet focuses on data security
1 May 2013
In a digitally driven world, TNPA’s data is critical to performing its mandated functions and effective backup and restore capabilities are an integral part of protecting this data. In an effort to automate and streamline this process, TNPA turned to Altonet and the HP Autonomy Connected Backup solution to reduce risk, improve efficiency and ensure mission critical data is secure and protected at all times.

Read more...
The key to fraud prevention
1 May 2013
One of the greatest challenges facing organisations is the time-consuming nature of detecting and investigating fraud, which further impacts the financial and productivity losses caused by the fraud itself.

Read more...



<< First   < Previous   Page 55 of 85   Next >   Last >>








While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.