GIT lauches FLIR’s FC-Series ID thermal cameras
Graphic Image Technologies (GIT), in conjunction with FLIR Systems, has announced the local availability of the FC-Series ID thermal security cameras, the latest models in its FC-Series line. The FC-Series ID thermal cameras combine built-in analytics for high...
ESET debuts early warning service
ESET is to offer ESET Threat Intelligence, a service that predicts and proactively notifies customers of real-time threats targeting their businesses so they can be more flexible when adapting to a rapidly changing threat landscape. The service will be rolled out...
Don’t just hand over personal information
South Africans are all too trusting when it comes to their personal information, and that can be dangerous. Sarel Lamprecht, MD of leading cyber insurance company Phishield, says that very few South Africans realise that when they hand over their ID cards for scanning...
DDoS application attacks: what you need to know
The best defence is a multi-layered one, covering the application and the network, says Martin Walshaw, senior engineer at F5 Networks. DDoS attacks are evolving. They are no longer simply a nuisance - they are highly-funded and highly-targeted. Anyone can launch a...
Gemalto pioneers SIM Reactivation solution
Gemalto has announced LinqUs SIM Reactivation, the world's first solution for real-time reactivation of dormant SIMs that allows operators to seamlessly reconnect lost prepaid subscribers at a fraction of normal acquisition costs. Gemalto's innovative platform is...
Ideco drives global biometric authentication
Having recently launched what it believes to be a world-first biometric solution that aims to change the way governments manage citizen authentication, Ideco now plans to revolutionise the $2-trillion global payment processing industry. With projected annual revenues...
Keep shopping malls and shoppers safe
With the annual holiday season fast approaching and shopping malls nationwide preparing for the usual end of year deluge, the safety and security of both tenants and consumers plays a critical part in the effective management of South Africa's retail environment....
Combating financial payment fraud using EFT
It is strange to think that one of the most used methods of transacting online - through a credit card - is actually not designed for the purpose. Security features such as the hologram, PIN and magnetic strip have all evolved over the course of 30 years to make...
Fujitsu Announces Availability of PalmSecure BioLock for SAP
Fujitsu has announced immediate availability of PalmSecure BioLock, the industry's most secure access control technology for SAP systems. Providing biometric access control for SAP ERP and HANA systems, Fujitsu PalmSecure BioLock is now available for the first time....
Social media can increase robbery risk
The 2016 Norton Cybersecurity Insights Report revealed that 67% of South Africans feel that it is getting more difficult to control their personal information due to smartphones and the internet. The popularity of social media platforms are growing rapidly in South...
Businesses need smarter technology strategies
Increased digitisation by companies in order to cut costs and streamline operations can have the opposite effect if cyber risks are not managed. This is according to Charl Ueckermann, managing director of AVeS Cyber Security. As part of its medium-term budget released...
Move over attackers, these are the big leagues
When a gaming provider is taken offline it frustrates hardcore users and damages the company's reputation. Because availability is of such primary importance to gamers, these firms are frequent targets for attack. "With distributed denial of service (DDoS) attacks...