Information Security



When cybercrime affects health and safety
1 April 2019, Editor's Choice
The threat of a category-one cyber-attack is that everything could seem right – the readings on the meter could be fine, checklists would be followed, and equipment would work – yet danger could still unfold.

Read more...
New service to fight cybersecurity threats to African banks
April 2019
Foregenix is launching a service to combat the new and growing breed of cyber-attacks on African banks.

Read more...
Cyber/physical perils in hospitality
April 2019, Wolfpack Information Risk, Editor's Choice, Entertainment and Hospitality (Industry)
How can we prepare for our holidays and avoid becoming the victim of a scam or data breach?

Read more...
Cloud and mobile deployments are the weakest links
April 2019
Report highlights the cloud and mobile attack vectors used to target enterprises: nearly one in five organisations experienced a cloud security incident in the past year.

Read more...
Rethink security priorities
1 April 2019, News & Events
Cryptocurrency mining is up 237%, phishing attacks increase by 269%, business email compromise attacks have gone up by 28%.

Read more...
New supply chain attack
1 April 2019, Kaspersky
Kaspersky Lab has uncovered a new advanced persistent threat (APT) campaign that has affected a large number of users through what is known as a supply chain attack.

Read more...
Overcoming the 2019 cyberthreat
1 April 2019, Infrastructure
The flexibility of remote working is good, however, the wider a network perimeter has to stretch, the more scope exists for security breaches.

Read more...
Halt, who goes there?
March 2019, Technews Publishing, Wolfpack Information Risk, Editor's Choice
As long as organisations treat their physical and cyber domains as separate, there is little hope of securing either one.

Read more...
IoT is convergence in action
March 2019, Gijima Specialised Solutions (GSS), NEC XON, Technews Publishing, G4S Secure Solutions SA, Editor's Choice, Integrated Solutions, Infrastructure
The Internet of Things gains more than enough attention these days, but the IoT demonstrates the reality of the convergence between the physical and cyber worlds, and physical security is part of it.

Read more...
Stop hacking of access control ­systems
March 2019, Editor's Choice, Access Control & Identity Management
Think someone hacking your access control system not a big deal? Scott Lindley suggests that you think again.

Read more...
New cybersecurity pavilion for Securex 2019
March 2019, Securex South Africa , Editor's Choice, News & Events, Conferences & Events, Training & Education
Securex South Africa 2019 has announced that 4Sight Technologies, a subsidiary of an international holdings company focusing on investing in Industry 4.0 companies, has signed on as the official sponsor ...

Read more...
Security by design
March 2019, Johnson Controls, Integrated Solutions
The security of the platforms on which physical security products are built will increasingly impact purchase decisions and market positions.

Read more...
A logical solution for cyber solutions
March 2019, Suprema, Access Control & Identity Management, Products & Solutions
BioMini Slim 2 is a thin, FBI PIV and FBI Mobile ID certified FAP20 optical scanner with a large platen for easy capturing of fingerprints.

Read more...
Managed IT security solution
March 2019, Infrastructure, Products & Solutions
The LanDynamix fully managed IT security stack ensures that all the main attack vectors typically used by hackers to breach a network are protected and proactively monitored.

Read more...
Top five security trends to look out for in 2019
March 2019, Genetec, Surveillance
From the continued focus on cybersecurity to the acquisition of global players, Genetec highlights the top five security trends to look forward to in 2019.

Read more...
Cyber Risk 101
March 2019
What every business needs to know about protecting themselves in case of a cyber-attack.

Read more...
Securing IoT, step by step
March 2019, Infrastructure
Kaspersky Lab joins forces with industry leaders to deliver actionable technical guidance for multiple IoT stakeholders.

Read more...
ESET launches a new blog aimed at insecure Android apps
March 2019
Insecure apps are much harder to identify and protect, while being no less of a threat.

Read more...
How to spot if your password was stolen in a security breach
1 March 2019
This article will tell you how to find out if your email address or password has been stolen and to check if passwords you are choosing are secure or not.

Read more...
The legalities of the digital signature
1 March 2019, Editor's Choice, Security Services & Risk Management
Electronic signatures and digital signatures differ significantly; it is critical that organisations recognise the legal implications of the electronic signature and the risk of fraud.

Read more...



<< First   < Previous   Page 34 of 84   Next >   Last >>