Information Security



Securing IT systems
April 2012, Fourier IT Innovation
Big access control vulnerabilities mean big opportunities in 2012.

Read more...
E-mail protection
April 2012
Loophold delivers Barracuda technology with reach inside the network perimeter for AV protection on MS Exchange: includes anti-virus agent that runs on Exchange servers and expanded encryption capabilities.

Read more...
More than backup
April 2012
Seamless and cost effective data protection solutions.

Read more...
Securing enterprise mobility
April 2012
Symantec advances enterprise mobility strategy, delivers innovations to improve data security and facilitate broader application adoption.

Read more...
Hosted backup gives small businesses peace of mind
6 March 2012
Small businesses often fail to keep adequate backups of their critical files and servers because it seems complicated and expensive. But losing data can be crippling for a business.

Read more...
USB encryption
6 March 2012
We are starting to see the arrival of GPS/GSM-enhanced USB sticks, which can be tracked as they move around in someone's briefcase, purse or pocket. These locate, but do not necessarily secure the data.

Read more...
780 new malicious programs detected every day
6 March 2012
780 signatures for new malicious programs that target sensitive financial information are added to Kaspersky Lab’s antivirus database on a daily basis.

Read more...
DAS, NAS, SAN, RAID - who cares?
March 2012, Infrastructure
Are surveillance storage acronyms driving you crazy?

Read more...
A 12-step programme
1 March 2012
Calum MacLeod describes the twelve steps to IT security Nirvana

Read more...
Virtual environments demand concrete security
1 March 2012
In order to keep corporate information safe in the virtual environment, organisations will need to take an integrated approach. Consider the following five steps to successfully implementing virtualisation in an organisation

Read more...
Small business, big risk
February 2012, Access Control & Identity Management
Small businesses are not directly attacked as often as larger organisations, but small and midsize businesses are still falling prey to cyber attacks

Read more...
McAfee Deep Defender arrives
1 March 2012
McAfee Deep Defender is capable of detecting nearly all kernel-mode malware because its protection layer is located beyond the operating system

Read more...
Virtually secure in the cloud
1 March 2012, Security Services & Risk Management
CA Southern Africa establishes an alliance with HyTrust to improve security and compliance for customers using virtualised systems and cloud infrastructures

Read more...
Android risks climbing
1 March 2012
Manufacturers of Android mobile phones continue to compromise users’ security says British IT security company on the eve of the Mobile World Congress in Barcelona

Read more...
Leading USB security
March 2012
Germany named European leader in USB drive data security.

Read more...
Watch your security posture
March 2012
Growing number of attacks by embedded system software.

Read more...
Safe SOHO surfing
March 2012
Being online is an extreme sport these days as hackers, malware and all sorts of unsavoury characters try to exploit (with success much of the time) unsuspecting users, even those not doing anything untoward ...

Read more...
Kaspersky Lab uncovered ‘fileless’ bot attacks
1 March 2012
While downloading the news teaser, the user’s browser was secretly redirected to a malicious website containing a Java-exploit. However, unlike standard drive by-attacks, the malicious program was not loaded to the hard drive, but appeared only in the operating memory of the computer.

Read more...
Backup Exec for small businesses
1 March 2012
Symantec has announced Backup Exec 2012 to help users eliminate complexity, perform backups in 100 percent virtualised environments and deliver instantaneous and cloud-based recovery through a single solution.

Read more...
Manage endpoint security from Smartphones
1 March 2012
Comodo has announced of a mobile app that enables small business IT staff to manage endpoint security from a smartphone. Endpoint Security Manager Console for Windows Phone is free to current owners of Comodo Endpoint Security Manager 2.0 Business Edition.

Read more...



<< First   < Previous   Page 60 of 87   Next >   Last >>








While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.