Information Security



Cybersecurity trends to watch in 2021
Issue 9 2020
Alain Tshal offers a few important cybersecurity trends South African organisations must look out for in 2021.

Read more...
A cybersecurity tipping point
Issue 9 2020
A tipping point for passwords, cloud jacking to emerge as a new risk, and zero trust will be the default position, as cyber risk grows dramatically in 2021.

Read more...
Shifting security to the edge
Issue 9 2020
As applications move to the cloud and networks become increasingly complex, organisations require a comprehensive security solution designed to protect the WAN edge.

Read more...
Why security integration is important
Issue 9 2020
Adrienne Campbell says the integration of physical and network security is important and offers eight reasons why.

Read more...
Ensure cybersecurity at the edge
Issue 9 2020
Organisations must be aware of the increased need to protect the edge of the network and prioritise cybersecurity before an attack happens.

Read more...
Protecting ICS and SCADA systems
Issue 9 2020
Check Point Software´s new rugged gateway secures industrial control systems and critical infrastructures against the most advanced cyber-threats.

Read more...
Cyber defence in an era of digital dependency
Issue 9 2020
Businesses across the globe have typically taken an immature approach to cybersecurity, believing that a firewall is an adequate fortress to defend their intellectual property.

Read more...
Improved resilience and simplicity
Issue 9 2020
Cisco helps its customers and partners to reimagine the way they work, with security innovations across its portfolio designed to offer greater agility, simplicity and resilience.

Read more...
Internet of threats
Issue 9 2020
Internet-connected devices can make us more efficient, save time and money, and allow us connectivity from almost anywhere, but they also require that we share more information than ever.

Read more...
New privacy protocol
Issue 9 2020
The @ Company is creating a more human-centric Internet built on people owning and controlling their personal data.

Read more...
Behaviour is the key
Issue 9 2020
When it comes to behaviour, visibility into human and system behaviour is key to spotting problems before they turn nasty.

Read more...
Securing the public sector
Issue 9 2020
The public sector is under threat, facing multiple attacks from multiple vectors that threaten security and systems.

Read more...
Mitigating the human risk in cybersecurity
Issue 9 2020, Technews Publishing
Technology can only do so much. Humans are still the biggest cyber risk, putting organisations in jeopardy through careless or even malicious actions.

Read more...
Cyber Talent: It is more about Talent than Cyber
1 October 2020
Four million trained workers are needed to fully bridge the skills gap in the cybersecurity field around the world and properly defend organisations against threat actors.

Read more...
Liquid Telecom unveils Cybersecurity unit
Issue 8 2020, News & Events
Liquid Telecom has unveiled its Cybersecurity unit, which offers end-to-end managed services for digital security solutions.

Read more...
Increased cloud visibility and security
1 October 2020
Sophos adds cloud visibility features from Cloud Optix to Intercept X Advanced for Server with EDR.

Read more...
Ransomware and customer loyalty
1 October 2020
Arcserve research uncovers links between ransomware, consumer purchasing behaviour and brand loyalty.

Read more...
IoT will transform industrial security
Issue 7 2020, Kaspersky
55% of organisations globally are confident the Internet of Things will change the state of security in industrial control systems (ICS).

Read more...
BYOD: bring your own danger
Issue 7 2020
Five cybersecurity threats that jeopardise the security of mobile devices and the keys to optimising their protection in a connected world.

Read more...
Nclose moves to secure Microsoft 365 environment
Issue 8 2020, News & Events
Nclose has launched dedicated Microsoft 365 managed security services within its Managed Security Services division, to help enterprises with newly-remote workforces close gaps in their security environment.

Read more...



<< First   < Previous   Page 28 of 87   Next >   Last >>








While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.