May 2, 2013
Last week (23 April), the Twitter account of the Associated Press (AP) news agency was hacked and subsequently sent out a hoax tweet reporting that President Barack Obama had been injured in an explosion in the White House. Within seconds, Wall Street was in panic...
Apr 30, 2013
Today most company employees use multiple devices to access business critical information within and outside of the organisation, writes Fred Mitchell, Security business unit manager at Drive Control Corporation (DCC). Computers, laptops, tablets and smartphones have...
Apr 26, 2013
As more and more CCTV cameras are deployed in safe city networks, at residential and business sites, in industrial complexes and in moving vehicles, taking advantage of new and smarter security technology is becoming vital, says Mark Chertkow, MD of Graphic Image...
Apr 15, 2013
The rate at which technology is currently progressing is so rapid that almost all government legislation regarding technology is out of date by the time it is written into law. In an attempt to prevent this, governments try to make legislation as technology neutral as...
Apr 12, 2013
Continuous research into, and development of, access control solutions means businesses can take advantage of a wider selection of low-cost technology. This technology is designed to offer complete security and empower decision-makers with control over the...
Apr 4, 2013
As South African IT managers and network administrators grapple with increasing threats against their organisations from hackers, phishing, malware and naive insiders, there is another dark threat looming on the horizon. These risks involve the use of corporate...