Information Security



Protect your data with IAM
July 2012, Access Control & Identity Management
Prevent fraud, comply with POPI and protect your data inside and out with identity and access management.

Read more...
Security perception vs reality
June 2012
‘State of Security’ report shows organisations recognise a pervasiveness and resiliency of cyber criminals’ yet 79% experienced a significant incident in past 12 months.

Read more...
Protect your Android
June 2012
Kaspersky Lab’s new tablet security solution provides effective protection from malware, secures the user online experience and keeps your personal data safe, even if the device is lost or stolen.

Read more...
It is what is inside
1 June 2012
An unsettling comment in the CSFI report states, “We have seen an alarming shift in the perpetrator profile towards senior management. This is also reflected in the types of economic crime that are being committed.”

Read more...
How safe are your mobile banking apps?
1 June 2012
25% of the mobile banking apps tested didn’t provide adequate security: passwords, partial credit card details, payment history and transaction details were easily retrieved from the handset. What’s more, another 31% of banking apps had less severe security issues with 44% offering adequate security.

Read more...
New backup option
1 June 2012
Symantec declares better backup for all sized organisations and calls for 80 percent reduction in operating costs. New survey data reveals that the current approach to backup modernisation is broken.

Read more...
E-mail plug-in boosts continuity
1 June 2012
Securicom has boosted its e-mail archiving and business continuity solution, MailVault, with a plug in that integrates with corporate e-mail clients and allows users to continue accessing and working with e-mails, using their usual e-mail interface, even when the server is down.

Read more...
Security begins with the basics
April 2012, Technews Publishing, Infrastructure
Whether your infrastructure is designed to support data, security or anything else, IP technology is under attack and you need to ensure it is protected to facilitate streamlined business and security operations.

Read more...
Data security is not optional
April 2012, Technews Publishing
Anyone who is not worried about the security of their data, be it personal information, contact databases or intellectual property, simply has not been paying attention.

Read more...
The RSA Security breach
April 2012
The sophisticated multi-pronged attack that struck RSA Security last March has resulted in the high profile IT security vendor overhauling the manufacturing and distribution of its SecurID tokens.

Read more...
Securing IT systems
April 2012, Fourier IT Innovation
Big access control vulnerabilities mean big opportunities in 2012.

Read more...
E-mail protection
April 2012
Loophold delivers Barracuda technology with reach inside the network perimeter for AV protection on MS Exchange: includes anti-virus agent that runs on Exchange servers and expanded encryption capabilities.

Read more...
More than backup
April 2012
Seamless and cost effective data protection solutions.

Read more...
Securing enterprise mobility
April 2012
Symantec advances enterprise mobility strategy, delivers innovations to improve data security and facilitate broader application adoption.

Read more...
Hosted backup gives small businesses peace of mind
6 March 2012
Small businesses often fail to keep adequate backups of their critical files and servers because it seems complicated and expensive. But losing data can be crippling for a business.

Read more...
USB encryption
6 March 2012
We are starting to see the arrival of GPS/GSM-enhanced USB sticks, which can be tracked as they move around in someone's briefcase, purse or pocket. These locate, but do not necessarily secure the data.

Read more...
780 new malicious programs detected every day
6 March 2012
780 signatures for new malicious programs that target sensitive financial information are added to Kaspersky Lab’s antivirus database on a daily basis.

Read more...
DAS, NAS, SAN, RAID - who cares?
March 2012, Infrastructure
Are surveillance storage acronyms driving you crazy?

Read more...
A 12-step programme
1 March 2012
Calum MacLeod describes the twelve steps to IT security Nirvana

Read more...
Virtual environments demand concrete security
1 March 2012
In order to keep corporate information safe in the virtual environment, organisations will need to take an integrated approach. Consider the following five steps to successfully implementing virtualisation in an organisation

Read more...



<< First   < Previous   Page 58 of 85   Next >   Last >>








While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.