Jan 13, 2015
Information about individuals has become readily available due to multiple transactions and the various online accounts people have, says Stan Khan, MD at Muvoni Biometrics and Smartcard Solutions (MBSS). With the advances in technology comes greater access to the...
Jan 7, 2015
Mining holds a unique position in South Africa as one of the largest employment sectors and a major contributor to the local economy. It is also one of the more dangerous industries, and as such is heavily regulated, says Avi Rose, country manager: South Africa at...
Dec 19, 2014
Rapidly evolving cyber threats and attack modes mean that every organisation should assume it has already been breached. The question now is – what to do next? Not only have cyber criminals become more sophisticated, but enterprise exposure to risk is growing fast,...
Dec 9, 2014
2014 has been particularly busy for IT security professionals. Many of the threats that we predicted at the start of the year duly emerged, while other significant issues caught the entire sector by surprise. We anticipated, and saw, increases in social engineering...
Dec 1, 2014
Advanced electronic signatures (AdvESs) were provided for in the ECT Act (2002), which defines two types of signatures – electronic, and advanced electronic, says Maeson Maherry, LAWtrust. An electronic signature (ES) enables you to link an act of acceptance (signing)...
Nov 28, 2014
Prevention is always better than cure when it comes to information security, particularly when dealing with today’s big data environments that see a flood of data drowning the enterprise on a daily basis. Gerald Naidoo, CEO of Logikal Consulting, says it’s not only...