Security Services & Risk Management



It is inside and it is on top
August 2012
Another characteristic of insider fraud is the ability of the perpetrators to cover their tracks – they’re talented at concealing their deception. The Citigroup fraud apparently relied on the insider being able to make various false accounting entries that created an illusion of legitimacy around the transactions that eventually ended up in his own account.

Read more...
Chip and pin devices under attack
August 2012
Researchers from British IT security company, MWR InfoSecurity, have demonstrated at the conference that it is possible to attack chip and pin devices using a specially prepared chip based credit card.

Read more...
POPI and the cloud
August 2012
In my previous article I gave a short breakdown of the new proposed Protection of Personal Information Act (POPI) and highlighted some of the issues that entities might encounter in terms thereof, especially when outsourcing processes to third parties.

Read more...
Piping hot cash
August 2012
GPT is putting cash in transit heist professionals out of work.

Read more...
Situational and risk aware SIEM
1 August 2012, Products & Solutions
Next generation SIEM Integrated with McAfee ePolicy Orchestrator, McAfee Risk Advisor and Global Threat Intelligence to provide customers with visibility and management.

Read more...
Employers are using online profiles as character references
1 August 2012
Beware of what you post online and make sure you’re comfortable with it being made public. Recruiters and prospective employers are reviewing people’s online profiles on social networks to learn a bit more about the character of individuals.

Read more...
Future proofing your surveillance solution
July 2012, Reditron
In designing a new system for a client, being prepared for the future sometimes starts with the smallest of details, such as which cable to use: coaxial or network cable?

Read more...
Verified job portal launched
July 2012
The details captured by a job seeker relating to qualifications and work history are verified upfront by MIE. A search on GradZ returns authenticated CVs every time.

Read more...
Data protection legislation in a nutshell
July 2012
Under POPI, almost every person or organisation that processes (collects, uses, retains, stores or destroys) personal information would be held accountable for that information.

Read more...
Luxurious security
July 2012, Technews Publishing
International Vaults has opened its second vault in South Africa. Following its successful launch in Durban, the latest vault is located in Sandton Square and offers clients the latest in security within luxurious surroundings.

Read more...
Risky assessments
July 2012
The risk assessment is a nebulous concept in our security industry. While it should be a process of discovering security vulnerabilities in your home or business and developing a plan to deal with them, it is more often than not simply seen a sales opportunity by security service providers.

Read more...
An ecosystem on its own
June 2012, Elvey Security Technologies
The electronic security industry is advancing rapidly, with older technology constantly being replaced by newer, faster and more reliable products. Without ongoing, specialised training, installers are not able to suggest the best solutions for clients or to answer their questions.

Read more...
Workplace in crisis
June 2012, iFacts
Rising unemployment and chronic work shortages – these scenarios often tempt even the most diligent and honest potential employee into ‘slightly embellishing’ their work history or qualifications and effectively committing employee integrity fraud.

Read more...
Maintenance is the cure
June 2012, Surveillance
A recent upgrade of the CCTV system at one of our clients provides an excellent example of why it is so important to have a scheduled maintenance programme for a CCTV system.

Read more...
Take control of enterprise risk
1 June 2012
Regulatory compliance has become of increasing importance in recent years, as a multitude of new regulations and legislation has forced the arm of businesses into obedience at the risk of hefty financial penalties.

Read more...
Business efficiency needs to be smarter
1 June 2012, Johnson Controls
In order to conserve scarce resources and minimise the impact on the environment, a more controlled approach to sustain our cities and homes is required where there is significantly less wastage.

Read more...
Entrapment - how far is too far?
May 2012, iFacts
Are you considering setting a trap to catch out a dishonest employee? If so, you would do well to consider the law on the issue, since the legal situation is slightly confused.

Read more...
Camsecure adds X-ray scanners to its portfolio
May 2012, Products & Solutions
Having completed a number of projects for large mines where full body X-ray scanners were required, Camsecure has added X-ray technology to its product portfolio. “While security and risk alleviation ...

Read more...
New IP server
May 2012, Evolving Management Solutions
New, cost-effective IP intercom server that uses IoIP technology. Commend UK, the integrated intercom solutions provider, is launching a new, cost-effective IP intercom server that uses its latest Intercom ...

Read more...
Feeling vulnerable?
April 2012, iFacts
Oprah Winfrey once said “Luck is a matter of preparation meeting opportunity”, and instead of being reactive, we need to anticipate issues and prepare for them.

Read more...



<< First   < Previous   Page 68 of 95   Next >   Last >>








While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.