Video surveillance trends for 2015

With the Internet of Things (IoT) continuing to be a hot topic throughout 2014 and across all industries – whether it’s about smart cars or intelligent appliances such as connected refrigerators – more consumers and businesses are now aware of the...

Logical access is key for privacy management

Information about individuals has become readily available due to multiple transactions and the various online accounts people have, says Stan Khan, MD at Muvoni Biometrics and Smartcard Solutions (MBSS). With the advances in technology comes greater access to the...

Electronic signatures aid mining security

Mining holds a unique position in South Africa as one of the largest employment sectors and a major contributor to the local economy. It is also one of the more dangerous industries, and as such is heavily regulated, says Avi Rose, country manager: South Africa at...

Effective security is proactive, agile, multi-layered

Rapidly evolving cyber threats and attack modes mean that every organisation should assume it has already been breached. The question now is – what to do next? Not only have cyber criminals become more sophisticated, but enterprise exposure to risk is growing fast,...

Security predictions for 2015

2014 has been particularly busy for IT security professionals. Many of the threats that we predicted at the start of the year duly emerged, while other significant issues caught the entire sector by surprise. We anticipated, and saw, increases in social engineering...

Advanced electronic signatures

Advanced electronic signatures (AdvESs) were provided for in the ECT Act (2002), which defines two types of signatures – electronic, and advanced electronic, says Maeson Maherry, LAWtrust. An electronic signature (ES) enables you to link an act of acceptance (signing)...