May 29, 2014
The repercussions of an online attack could be detrimental to a business, with both financial as well as reputation loss at stake, says Carey van Vlaanderen, CEO of ESET. With BYOD, mobility and cloud software becoming a standard for many companies, security should be...
May 26, 2014
Mobile devices and tablets are no longer used solely for communication, with social media and the development of applications that can do almost anything you can think of, these devices are being used for work, play and everything in between, says Gregory Anderson,...
May 26, 2014
It is no longer enough to understand how you are being attacked; you need to understand who is attacking you and why. It is only though this understanding that a successful defence can be undertaken, says Jayson O’Reilly, director of Sales and Innovation at DRS....
Apr 30, 2014
The use of thermal imaging cameras for surveillance has increased significantly over the last three to five years as pricing has dropped. The benefits are significant, whether used to augment or replace traditional CCTV systems. This is driving organisations’ across...
Apr 29, 2014
Unstructured data is burgeoning. In order to protect and manage that data, organisations need to have systems and structures in place, and must understand how the data is being used, by whom it is being used, and most of all, they must know exactly who should not be...
Apr 29, 2014
Mobility and cloud computing are currently hot topics in the IT space, enabling users to work on the move and from practically anywhere in the world. However, in order to deliver the full capabilities of these two technologies, virtualisation is critical to creating a...