Information Security



New model for consumer security
1 July 2013
McAfee launches unlimited cross-device security service with facial and voice recognition for consumer devices.

Read more...
Financial institutions gamble with information security
1 July 2013, Financial (Industry)
Lack of security specialists lead to high risk, quick fix security solutions.

Read more...
Mining the cloud for security
1 July 2013
Cloud-based solutions embracing endpoint protection, e-mail security and systems management.

Read more...
Security for small businesses
1 July 2013
New 600 appliances provide security solutions to protect small businesses against the latest cyber attacks.

Read more...
New information protection solution
1 July 2013
Xerox and McAfee team up to deliver a new level of data protection.

Read more...
Verifying identity is essential
1 July 2013
“Being able to verify identity is essential to ensure that you are transacting with and communicating to a legitimately recognised and intended recipient,” says LAWtrust certificate service manager Megan Rehbock.

Read more...
New protection from ESET
June 2013
ESET releases ESET NOD32 Antivirus 6 and ESET Smart Security 6 with Anti-Theft, a dedicated Anti-Phishing Module and ESET Social Media Scanner.

Read more...
MWEB Business extends security offering
June 2013
MWEB Business has extended its portfolio of security offerings with the introduction of Percol8.

Read more...
Authentication critical in cyber ­security
1 May 2013
The unfortunate reality is that while business leaders know they are at war, they are prepared to tackle a highly skilled and motivated enemy with inferior weapons and tactics.

Read more...
Transnet focuses on data security
1 May 2013
In a digitally driven world, TNPA’s data is critical to performing its mandated functions and effective backup and restore capabilities are an integral part of protecting this data. In an effort to automate and streamline this process, TNPA turned to Altonet and the HP Autonomy Connected Backup solution to reduce risk, improve efficiency and ensure mission critical data is secure and protected at all times.

Read more...
The key to fraud prevention
1 May 2013
One of the greatest challenges facing organisations is the time-consuming nature of detecting and investigating fraud, which further impacts the financial and productivity losses caused by the fraud itself.

Read more...
The future is a secure cloud
1 May 2013
Cloud computing is predicted to be the future of the technology world and analyst reports abound on the expected growth of the uptake of these solutions. However, security issues remain one of the dominant barriers with the adoption of cloud solutions.

Read more...
Secure authentication for company networks
1 May 2013
ESETlaunches ESET Secure Authentication in South Africa: new two-factor one-time password authentication system for company networks.

Read more...
Preparation, expectation and ­authentication is key
April 2013, Technews Publishing
How exposed are South African companies to cyber attacks? Are they an easy target or simply ignorant? Are they doing enough to protect themselves? How serious is this threat to your average company in South Africa and Africa, or is the threat confined to certain types of companies?

Read more...
A conversation about security
April 2013, Technews Publishing
The person who is probably most in touch with the state of information security in South Africa is Craig Rosewarne, MD of Wolfpack Information Risk and founder and chairperson of the Information Security ...

Read more...
New approach to security
April 2013
RSA, the security division of EMC, announced the release of RSA Security Analytics, a transformational security monitoring and investigative solution designed to help organisations defend their digital ...

Read more...
Six-month lifespan of technology
April 2013
In 2010, the South African government declared cybersecurity to be a national security priority. Since then, the country has been victim to trading stoppages at the Johannesburg Stock Exchange because ...

Read more...
Breaking the browser
April 2013
Critical vulnerabilities in Google Chrome that could leave millions of Web users exposed to risk were demonstrated on March 6th by the winners of this year’s Pwn2Own competition, global IT security firm ...

Read more...
How to be an info-loser
1 April 2013
These simple, everyday mistakes could end up compromising machines, exposing users to identity theft and allowing sensitive information to fall into the wrong hands. To protect yourself, your business and your information, avoid doing these 10 things that will practically guarantee that you lose your data in 2013.

Read more...
Strategy for future of business security
1 April 2013
McAfee Security Connected redefines organisational security through integrated management, intelligent solutions and open ecosystem.

Read more...



<< First   < Previous   Page 57 of 87   Next >   Last >>








While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.