Information Security



The future is a secure cloud
1 May 2013
Cloud computing is predicted to be the future of the technology world and analyst reports abound on the expected growth of the uptake of these solutions. However, security issues remain one of the dominant barriers with the adoption of cloud solutions.

Read more...
Secure authentication for company networks
1 May 2013
ESETlaunches ESET Secure Authentication in South Africa: new two-factor one-time password authentication system for company networks.

Read more...
Preparation, expectation and ­authentication is key
April 2013, Technews Publishing
How exposed are South African companies to cyber attacks? Are they an easy target or simply ignorant? Are they doing enough to protect themselves? How serious is this threat to your average company in South Africa and Africa, or is the threat confined to certain types of companies?

Read more...
A conversation about security
April 2013, Technews Publishing
The person who is probably most in touch with the state of information security in South Africa is Craig Rosewarne, MD of Wolfpack Information Risk and founder and chairperson of the Information Security ...

Read more...
New approach to security
April 2013
RSA, the security division of EMC, announced the release of RSA Security Analytics, a transformational security monitoring and investigative solution designed to help organisations defend their digital ...

Read more...
Six-month lifespan of technology
April 2013
In 2010, the South African government declared cybersecurity to be a national security priority. Since then, the country has been victim to trading stoppages at the Johannesburg Stock Exchange because ...

Read more...
Breaking the browser
April 2013
Critical vulnerabilities in Google Chrome that could leave millions of Web users exposed to risk were demonstrated on March 6th by the winners of this year’s Pwn2Own competition, global IT security firm ...

Read more...
How to be an info-loser
1 April 2013
These simple, everyday mistakes could end up compromising machines, exposing users to identity theft and allowing sensitive information to fall into the wrong hands. To protect yourself, your business and your information, avoid doing these 10 things that will practically guarantee that you lose your data in 2013.

Read more...
Strategy for future of business security
1 April 2013
McAfee Security Connected redefines organisational security through integrated management, intelligent solutions and open ecosystem.

Read more...
Secure all infection vectors
1 April 2013
While endpoint security and firewalls are critical in preventing business disruptions, these measures alone are no longer sufficient to ward off the sophisticated avalanche of malware pervading our daily lives.

Read more...
Anti–virus alone is no longer enough
1 April 2013
Kaspersky Endpoint Security for Business delivers deeper protection and seamless manageability to IT departments besieged by cybercrime and changing business demands.

Read more...
Securing your cloud backup
1 April 2013
Popular cloud storage and backup solutions deliver lower total cost of ownership and more convenience for SMEs, but are cloud backups secure? Many South African organisations do not feel comfortable with the perceived parting with control of their company information.

Read more...
Criminal focus is on apps
March 2013
The growth in cybercrime generally is well reported, but South African businesses are still not taking it seriously enough – particularly when it comes to application security. According to research firm Gartner, 75% of attacks are directed at the application layer and 75% of successful attacks target vulnerabilities that were already known.

Read more...
Cyber security in 2013
January 2013
“We have built our future upon a capability that we have not learned how to protect. We have ignored the need to build trust into our systems. Simply hoping that someday we can add the needed security before it is too late is not a strategy.”

Read more...
Secure backups for SMEs
1 January 2013
Vox Telecom has announced a suite of products to bring the security, cost and reliability of corporate-grade hosted services to small and medium-sized businesses. Moreover, they are so confident of success they are offering to pay up to R100 000 to any business that cannot restore its audited data from Vox backups.

Read more...
Information security, governance and compliance
1 January 2013, Ideco Biometrics
The approach to fixing the mega-problem of credential abuse has traditionally been to apply more of the same. In an attempt to prevent abuse, passwords and PINs have become longer and more complex. Many organisations require them to be changed on a regular basis.

Read more...
How serious is Internet-related crime in South Africa?
1 January 2013, Financial (Industry)
Crime prevention and safety is a high priority of the SA government, and Statistics SA has begun with the Victims of Crime Survey (VOCS) 2012 and will produce a VOCS series annually.

Read more...
88% of companies do not protect their databases
1 January 2013
GreenSQL revealed that 88% of all companies participating in its December survey do not protect their databases from both external and internal threats, and almost one fifth do nothing to protect their databases at all.

Read more...
Anti-keylogging keystroke encryption for Windows 8
1 January 2013
Prevents theft of personal & corporate information overcoming the inadequacies of anti-virus software.

Read more...
Rising attacks focus on browsers and social media networks
1 January 2013
IBM’s X-Force 2012 Trend and Risk Report, which shows a sharp increase in browser-related exploits, renewed concerns around social media password security, and continued disparity in mobile devices and corporate bring your own device (BYOD) programs.

Read more...



<< First   < Previous   Page 56 of 85   Next >   Last >>








While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.