Information Security



DDoS attacks demand different defence strategies
1 November 2018
Despite the fact that firewalls, IPS and load balancers are some of the least effective mitigation measures against distributed DDoS attacks, they remain at the top of the list.

Read more...
New defence approaches required
1 November 2018
As information security faces the need to evolve rapidly to meet a world of new challenges; visibility, user-centricity and crypto currencies will be the order of the day.

Read more...
Smart cities. Is it wise to get smarter?
1 November 2018
As the popularity and inevitability of smart cities expand, so too does a cybercriminal’s opportunistic attack surface.

Read more...
Effective edge security needs to be holistic
October 2018, Technews Publishing
The modern paradigm requires that a holistic and layered approach be adopted to secure networks from breaches at the edge, and everywhere else.

Read more...
Basic cyber hygiene practices
October 2018, Infrastructure
When on the job at a corporate office, a healthcare organisation, or an academic institution or government agency, or even when you are working from a local coffee shop, restaurant, or home office, your organisation’s online safety and security is a responsibility shared by all.

Read more...
Securing edge devices and the data they contain
October 2018, AVeS Cyber Security, Editor's Choice, Infrastructure
Charl Ueckermann looks at some best practices to ensure edge devices are not your biggest risk devices in a hyper-connected, perimeter-less world.

Read more...
CyberGym launches South African arena
October 2018, Wolfpack Information Risk, Editor's Choice, News & Events, Training & Education
Wolfpack recently introduced a new cybersecurity training service to South Africa. CyberGym is an Israeli company that specialises in real-life cyber training, teaching students with real world simulations.

Read more...
GreyEnergy group targeting critical infrastructure
1 October 2018, News & Events
ESET researchers reveal a successor to the feared BlackEnergy APT group - in the footsteps of a feared threat actor, with a new arsenal of tools.

Read more...
J2 offers enterprise-grade security for SMEs
October 2018, News & Events
Rising levels of cybercrime, and its increasing sophistication, threaten businesses of all sizes but SMEs are particularly vulnerable.

Read more...
Tax season is financial crime season
1 October 2018, Security Services & Risk Management
Carey van Vlaanderen from ESET offers some steps you can take to keep the scammers at bay during financial crime season – and all year round.

Read more...
The most important features of a management platform
September 2018, Technews Publishing, Editor's Choice, Surveillance, Access Control & Identity Management, Integrated Solutions
Hi-Tech Security Solutions asks the industry for the top three features you should be looking for in a security management platform.

Read more...
Nearly every third corporate data breach gets employees fired
1 September 2018, News & Events
According to a new report from Kaspersky Lab and B2B International, 25% of data breaches in the Middle East, Turkey and Africa (META) region in the past year have led to people losing their jobs.

Read more...
IoT in your home: what are the risks?
1 September 2018
Put security in place before investing in IoT smart home devices.

Read more...
Threats to control rooms
September 2018, Contract Surveillance Services, Surveillance
CSS offers advice for protecting remote control rooms from criminal attacks and interference.

Read more...
The link between passwords and sextortion
1 September 2018, Editor's Choice
John Mc Loughlin, CEO of J2 Software, says the company is being engaged to consult with victims of what is becoming an alarming increase in incidents of sextortion.

Read more...
Modern KPIs for effective cybersecurity
1 September 2018
Faced with increasingly frequent and sophisticated cyber-attacks, enterprises are scrambling to put technologies and processes in place to effectively detect and combat cyber risks.

Read more...
Ten cybersecurity smart home tips from Ben-Gurion University
1 September 2018
According to cyber researchers at Ben-Gurion University of the Negev, Cyber Security Awareness Month is an excellent time to make a few simple changes that will result in a far greater level of safety and security.

Read more...
Facing the cybersecurity challenge
August 2018, Technews Publishing
There are many cybersecurity products and solutions out there, but what do they offer and how will they protect you and strengthen your cybersecurity posture?

Read more...
Visibility is security
August 2018
Andrew Wilson, CEO at LucidView says effective threat detection boils down to one thing – visibility.

Read more...
5 steps to integrating business continuity and cyber resilience
August 2018, Security Services & Risk Management
It is imperative that cyber resilience is integrated into organisations’ business continuity management plans.

Read more...



<< First   < Previous   Page 37 of 84   Next >   Last >>