Information Security



Six-month lifespan of technology
April 2013
In 2010, the South African government declared cybersecurity to be a national security priority. Since then, the country has been victim to trading stoppages at the Johannesburg Stock Exchange because ...

Read more...
Breaking the browser
April 2013
Critical vulnerabilities in Google Chrome that could leave millions of Web users exposed to risk were demonstrated on March 6th by the winners of this year’s Pwn2Own competition, global IT security firm ...

Read more...
How to be an info-loser
1 April 2013
These simple, everyday mistakes could end up compromising machines, exposing users to identity theft and allowing sensitive information to fall into the wrong hands. To protect yourself, your business and your information, avoid doing these 10 things that will practically guarantee that you lose your data in 2013.

Read more...
Strategy for future of business security
1 April 2013
McAfee Security Connected redefines organisational security through integrated management, intelligent solutions and open ecosystem.

Read more...
Secure all infection vectors
1 April 2013
While endpoint security and firewalls are critical in preventing business disruptions, these measures alone are no longer sufficient to ward off the sophisticated avalanche of malware pervading our daily lives.

Read more...
Anti–virus alone is no longer enough
1 April 2013
Kaspersky Endpoint Security for Business delivers deeper protection and seamless manageability to IT departments besieged by cybercrime and changing business demands.

Read more...
Securing your cloud backup
1 April 2013
Popular cloud storage and backup solutions deliver lower total cost of ownership and more convenience for SMEs, but are cloud backups secure? Many South African organisations do not feel comfortable with the perceived parting with control of their company information.

Read more...
Criminal focus is on apps
March 2013
The growth in cybercrime generally is well reported, but South African businesses are still not taking it seriously enough – particularly when it comes to application security. According to research firm Gartner, 75% of attacks are directed at the application layer and 75% of successful attacks target vulnerabilities that were already known.

Read more...
Cyber security in 2013
January 2013
“We have built our future upon a capability that we have not learned how to protect. We have ignored the need to build trust into our systems. Simply hoping that someday we can add the needed security before it is too late is not a strategy.”

Read more...
Secure backups for SMEs
1 January 2013
Vox Telecom has announced a suite of products to bring the security, cost and reliability of corporate-grade hosted services to small and medium-sized businesses. Moreover, they are so confident of success they are offering to pay up to R100 000 to any business that cannot restore its audited data from Vox backups.

Read more...
Information security, governance and compliance
1 January 2013, Ideco Biometrics
The approach to fixing the mega-problem of credential abuse has traditionally been to apply more of the same. In an attempt to prevent abuse, passwords and PINs have become longer and more complex. Many organisations require them to be changed on a regular basis.

Read more...
How serious is Internet-related crime in South Africa?
1 January 2013, Financial (Industry)
Crime prevention and safety is a high priority of the SA government, and Statistics SA has begun with the Victims of Crime Survey (VOCS) 2012 and will produce a VOCS series annually.

Read more...
88% of companies do not protect their databases
1 January 2013
GreenSQL revealed that 88% of all companies participating in its December survey do not protect their databases from both external and internal threats, and almost one fifth do nothing to protect their databases at all.

Read more...
Anti-keylogging keystroke encryption for Windows 8
1 January 2013
Prevents theft of personal & corporate information overcoming the inadequacies of anti-virus software.

Read more...
Rising attacks focus on browsers and social media networks
1 January 2013
IBM’s X-Force 2012 Trend and Risk Report, which shows a sharp increase in browser-related exploits, renewed concerns around social media password security, and continued disparity in mobile devices and corporate bring your own device (BYOD) programs.

Read more...
Application security
November 2012, Technews Publishing
The latest South African Cyber Threat Barometer for 2012/13 estimates that R2,65 billion was lost to cyber crime in the period from January 2011 to August 2012, with just over R660 million that was not recovered.

Read more...
Non-invasive threat-monitoring service
1 November 2012
Magix Security has announced a new monitoring service that simplifies monitoring and managing the threats presented by corporate insiders, delivering real-time protection against malicious activity and highlighting vulnerabilities that could compromise security.

Read more...
The lowdown on data storage
1 November 2012
Current protection approaches to businesses storing and protecting critical data are increasingly falling short due to network, security and usability constraints. Business managers are realising that effective data protection is crucial to the integrity of stored information.

Read more...
Cisco's data centre security tools
1 November 2012
Cisco has introduced a set of security solutions designed to protect data centres in South Africa against the threats they face in moving toward more consolidated and virtualised environments.

Read more...
Millions of Android users still at risk
October 2012
MWR InfoSecurity, an international IT security company, has won the US$30 000 prize at the Mobile Pwn2Own competition held at the EuSecWest Conference in Amsterdam in September.

Read more...



<< First   < Previous   Page 57 of 86   Next >   Last >>








While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.