Understanding ‘bad’ user behaviour
A common maxim today is that a determined enough hacker will eventually get in, usually within minutes. Even more frightening, most of today's advanced threats remain undetected for weeks or even months. This is presenting huge challenges for the security industry....
Don’t be a victim of ATM theft this festive season
Many South Africans will be taking it easy during their well-deserved end-of-year holiday, but one portion of the population that will be working as hard as ever- financial scammers. The festive season is traditionally big business for fraudsters and thieves, because...
New ways to combat BYOD security threats
Employees in many companies are doing more of their work and executing an increasing number of transactions on mobile devices, while making less use of their desktops and notebooks. That trend means that hackers and malware authors are increasingly focusing their...
Trend Micro adds cloud security
As local companies join the multitudes looking to virtualisation and the cloud for cost savings and improved agility, concerns about security are rising. According to Trend Micro, the best way to maintain security and optimise performance is with a single security...
Nexmo debuts Verify SDK
Nexmo, the global cloud communications platform leader, has announced global availability of Verify SDK for iOS, Android and JavaScript operating systems and programming languages. Now developers will be able to easily add phone verification with a single line of code...
Commvault defines new challenges
Commvault has identified a series of emerging customer needs facing CIOs and technology and business leaders as they face the challenges of rapidly changing technology, tightening resource requirements, and ever-expanding volumes of data. The company has also outlined...
Samsung offers affordable video surveillance
As the sole distributor of Samsung telecommunication and PABX equipment in Sub-Saharan Africa, MIA Telecoms has launched a range of Samsung security solutions to the local market. Samsung Techwin's video surveillance products are based upon cutting edge technologies...
What you need to know about cyber-security innovation
As cyber attackers increase their ability to innovate, so they are able to enhance their capacity to outpace state-of-the-art security technology, writes Paolo Campoli, head of global service provider sales: Middle East & Africa at Cisco. Keeping up with the...
What you need to know about cyber-security innovation
As cyber attackers increase their ability to innovate, so they are able to enhance their capacity to outpace state-of-the-art security technology, writes Paolo Campoli, head of global service provider sales: Middle East & Africa at Cisco. Keeping up with the...
Security: the platform for IoT success
Widely regarded as the hottest topic in high-tech, the IoT (Internet of Things) is attracting the attention of countless enterprises across a wide array of industries, writes Sherry Zameer, senior vice-president: telecommunication solutions for the Middle East &...
How the cloud can improve security
As we trust more and more of our critical applications, services and systems to the cloud, there is no reason why security should not be on that list, says Gary Newe, technical director at F5 Networks. The advantage of being in this industry for a while is that you...
GIT’s DVTEL suite offers 4K visuals, thermal cameras
Perimeter security is a fundamental component of security systems - a first line of defence against external physical threats. Advanced video surveillance systems, like the DVTEL suite from Graphic Image Technologies (GIT), provide an advantage, incorporating thermal...