Information Security



Dahua Technology’s cybersecurity approach
Issue 3 2021, Dahua Technology South Africa, Surveillance
With a mindset that emphasises cybersecurity and all the resources it can allocate to establish, carry out and strengthen its cybersecurity approach, Dahua plans to stay positive, open, responsible and constantly improving its cybersecurity.

Read more...
SASE-enriched threat protection
Issue 3 2021
MVISION XDR automates security investigation and response processes with actionable threat insights harnessed from deeply integrated cloud data sources, with the ability to proactively stop targeted attacks.

Read more...
Active Adversary Playbook 2021
Issue 3 2021
Sophos has released its Active Adversary Playbook 2021, detailing cyber-attacker behaviours and the tools, techniques and procedures Sophos’ frontline threat hunters and incident responders saw in the wild.

Read more...
Passwords are 60, time for them to go
Issue 3 2021, Access Control & Identity Management
It has been 60 years since passwords were first used at MIT and if the number of breaches in the news are anything to go by, we are no more adept at managing our passwords than we were in 1961.

Read more...
Surveillance business models are changing
CCTV Handbook 2021, Technews Publishing, Bosch Building Technologies, Dahua Technology South Africa, Genetec, Editor's Choice, Surveillance, Integrated Solutions, Infrastructure
The CCTV Handbook round table highlighted the changes that are happening in the surveillance and security world in general, from cloud to costing models and of course, cybersecurity.

Read more...
Building walls is not enough
Issue 3 2021, Guardian Eye
Cybersecurity: businesses are still building walls to defend against nuclear attacks.

Read more...
VMware releases 2021 Global Security Insights Report
Issue 3 2021
VMware releases 2021 Global Security Insights Report detailing the surge in cyberattacks targeting the ‘anywhere’ workforce, highlighting opportunity for security leaders to rethink and transform cybersecurity strategies.

Read more...
Awareness training is key to e-mail security
Issue 3 2021
Awareness training should be actively deployed to complement organisations’ efforts to secure their e-mail systems, because hackers are increasingly targeting people as security technologies become more effective.

Read more...
Mobile authentication is key to negating cybercrime in East Africa
Issue 3 2021
The rapid pace of digital transformation in East Africa has had a significant impact on not only how people live their lives, but also on how communication and commerce are conducted.

Read more...
The inner world of DLP systems
Issue 3 2021
DLP (data loss prevention) systems are used not only to protect against data breaches, but allow us to turn information security into a service for other departments of the company, from HR to accounting.

Read more...
McAfee and Ingram Micro simplify cloud security
Issue 3 2021
McAfee cloud-delivered security solutions now available via flexible, subscription-based licencing, on Ingram Micro Cloud Marketplace.

Read more...
More is less in cybersecurity
Issue 2 2021
Post-pandemic paradox: more solutions do not bring better protection. Despite 80% of organisations running up to 10 different protection and cybersecurity solutions simultaneously, more than 50% of them experienced downtime from data loss last year.

Read more...
Ransomware and Microsoft Exchange Server attacks are surging
Issue 2 2021
Check Point Research sees global surges in ransomware attacks, alongside increases in cyberattacks targeting Microsoft Exchange Server vulnerabilities at a time where CISA has raised the alarm about ransomware attacks against Microsoft Exchange servers.

Read more...
Malware disguised as meeting apps spiked by 1067%
Issue 2 2021
Atlas VPN analysis reveals that cyber threats disguised as videoconferencing applications jumped by 1067% in a year. The data analysed was provided by Kaspersky.

Read more...
The realities of AI in cybersecurity: catastrophic forgetting
Issue 2 2021
There is a lot of hype about the use of artificial intelligence (AI) in cybersecurity. The truth is that the role and potential of AI in security is still evolving and often requires experimentation and evaluation.

Read more...
Cyber makes it secure
Issue 2 2021
Stas Protassov, Acronis co-founder and technology president comments on the recent hacking of over 150 000 Verkada surveillance cameras.

Read more...
Security patches are not a plan
Issue 2 2021
Patches are undoubtedly an essential component of a cybersecurity strategy, but with the current digital landscape, with many employees continuing to work from home, patches alone are not sufficient.

Read more...
Sophos unveils XGS firewall appliances
Issue 2 2021
Sophos unveils XGS firewall appliances with optimised Transport Layer Security (TLS) inspection in light of new research that identifies a surge in cybercriminals using TLS to carry out attacks.

Read more...
Kaspersky reveals five ways ransomware gangs play today
Issue 2 2021
] Over the past few years, the methods cybercriminals use to distribute ransomware has changed dramatically. While a few years ago, they would spread encrypted files on a large scale, today their ransomware attacks have become more focused.

Read more...
Safe, friction-free user interactions
Issue 2 2021
F5 announced the addition of new SaaS products to its application security portfolio: Device ID and Shape Recognize make use of unique data and analytics capabilities, streamlining customer experiences by removing login friction for users while guarding against fraud.

Read more...



<< First   < Previous   Page 24 of 85   Next >   Last >>








While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.