Automation and AI in security Issue 4 2021, Editor's Choice, Commercial (Industry) It’s important for businesses to have an internal strategy for automation and AI as these can relate to both cybersecurity and other parts of the business and provide a benchmark for evaluating the security vendor.
Secure-by-design and secure-by-default Issue 4 2021, Regal Security Distributors SA “How can you make sure your video device manufacturer lives up to all their cybersecurity promises?” asks Fred Streefland, director of cybersecurity at Hikvision EMEA.
How to prevent employee data theft Issue 4 2021 With inside jobs frighteningly frequent, a cybersecurity expert shares prevention tips to avoid malicious insider attacks.
The human element in cybercrime Issue 4 2021, iFacts Keeping up with threat intelligence is a must for any security analyst today and the insider threat remains a huge part of any risk analysis.
Insider threat detection for security and compliance Issue 4 2021 DTEX continuously monitors servers to surface abnormalities, or Indicators of Intent, to help organisations autonomously identify threats to their environments, including those associated with data loss like reconnaissance, obfuscation and circumvention.
Sophos Acquires Refactr Issue 4 2021 Deal further automates Sophos’ Adaptive Cybersecurity platform, which underpins all of Sophos’ product solutions, services, threat intelligence and data lake to Optimise MTR and XDR with security orchestration automation and response.
TRENDnet introduces Hive Issue 4 2021, TRENDnet TRENDnet Hive is an advanced network cloud manager designed to save on cost and time by simplifying and centralising network management and monitoring.
Prevention is better than cure Issue 4 2021 Jack Garnsey, product manager Security Awareness Training and SafeSend, VIPRE explains that by taking a preventative approach, businesses can take the necessary steps to strengthen their cybersecurity posture.
Protecting the Respublica student network Issue 4 2021 MySky Networks has partnered with Networks Unlimited to implement the Fortinet Security Fabric at Respublica Student Living, a provider of 10 upmarket residences for students in tertiary education around the country.
Sanitise your phone Issue 4 2021 Your mobile device is at risk of infection, putting your personal information and privacy at risk of fraud and identity theft.
Dahua’s cybersecurity approach CCTV Handbook 2021, Dahua Technology South Africa The world is getting smarter and everything is going to have an online ID and then connect into a vast network of IoT devices, like a laptop computer, a mobile phone, a connected thermostat and more.
Hacking yourself must become the norm Issue 3 2021, Guardian Eye With the Protection of Personal Information Act (PoPIA) coming into full effect in July 2021 and bringing with it the threat of financial and reputational damages, businesses need to take a more proactive approach toward cybersecurity.
Retail cybersecurity in an evolving threat landscape Issue 3 2021 The change in consumer shopping habits parallels the types of security risks impacting digital retail business, meaning retailers must be more aware of the cybersecurity posture of their industry.
Dahua Technology’s cybersecurity approach Issue 3 2021, Dahua Technology South Africa, Surveillance With a mindset that emphasises cybersecurity and all the resources it can allocate to establish, carry out and strengthen its cybersecurity approach, Dahua plans to stay positive, open, responsible and constantly improving its cybersecurity.
SASE-enriched threat protection Issue 3 2021 MVISION XDR automates security investigation and response processes with actionable threat insights harnessed from deeply integrated cloud data sources, with the ability to proactively stop targeted attacks.
Active Adversary Playbook 2021 Issue 3 2021 Sophos has released its Active Adversary Playbook 2021, detailing cyber-attacker behaviours and the tools, techniques and procedures Sophos’ frontline threat hunters and incident responders saw in the wild.
Passwords are 60, time for them to go Issue 3 2021, Access Control & Identity Management It has been 60 years since passwords were first used at MIT and if the number of breaches in the news are anything to go by, we are no more adept at managing our passwords than we were in 1961.
Surveillance business models are changing CCTV Handbook 2021, Technews Publishing, Bosch Building Technologies, Dahua Technology South Africa, Genetec, Editor's Choice, Surveillance, Integrated Solutions, Infrastructure The CCTV Handbook round table highlighted the changes that are happening in the surveillance and security world in general, from cloud to costing models and of course, cybersecurity.