Logical access is key for privacy management

Information about individuals has become readily available due to multiple transactions and the various online accounts people have, says Stan Khan, MD at Muvoni Biometrics and Smartcard Solutions (MBSS). With the advances in technology comes greater access to the...

Electronic signatures aid mining security

Mining holds a unique position in South Africa as one of the largest employment sectors and a major contributor to the local economy. It is also one of the more dangerous industries, and as such is heavily regulated, says Avi Rose, country manager: South Africa at...

Effective security is proactive, agile, multi-layered

Rapidly evolving cyber threats and attack modes mean that every organisation should assume it has already been breached. The question now is – what to do next? Not only have cyber criminals become more sophisticated, but enterprise exposure to risk is growing fast,...

Security predictions for 2015

2014 has been particularly busy for IT security professionals. Many of the threats that we predicted at the start of the year duly emerged, while other significant issues caught the entire sector by surprise. We anticipated, and saw, increases in social engineering...

Advanced electronic signatures

Advanced electronic signatures (AdvESs) were provided for in the ECT Act (2002), which defines two types of signatures – electronic, and advanced electronic, says Maeson Maherry, LAWtrust. An electronic signature (ES) enables you to link an act of acceptance (signing)...

Protecting a big data environment

Prevention is always better than cure when it comes to information security, particularly when dealing with today’s big data environments that see a flood of data drowning the enterprise on a daily basis. Gerald Naidoo, CEO of Logikal Consulting, says it’s not only...