Blog Header

In: Information Security

atricore, identity and access management solutions
Identity and access management in Africa: SYLVERSYS & Atricore join forces
November 18, 2016

US-based Atricore, Inc. is teaming up with Sylversys, bundling top tier security auditing capabilities with enterprise level identity and access management…

Read More
5 Steps to Secure & Affordable Video Conferencing for SMBs
June 24, 2013

STEP #1: Get the Setup right You will need the following in your meeting room: 1x TV or Video Projector 1x…

Read More
Security considerations in Small and Medium Enterprises (SMEs)
June 27, 2012

When comparing SMEs and Large Enterprises on Security, one element is found to be common to the two: They both utilize…

Read More
Achieving Physical Security in 5 Steps
April 2, 2012

We’ve all experienced these: Theft of a laptop or other portable device in a supposedly secured environment, theft of a server…

Read More
The Truth behind Zero-Day Attacks
April 7, 2010

Zero-Days attacks represent the most frightful nightmares of all security concerns out there in the world. But first, let’s put a…

Read More
Security in the Cloud -Should it be trusted?
November 27, 2009

Cloud Computing! The acclaimed next-generation way of computing offers many benefits indeed. Leveraging both P2P (Peer-2-Peer) and Online collaboration technologies, Cloud…

Read More
Security Match: Technology Vs. Attitude
August 21, 2009

As technology evolves, more and more defense techniques are brought forth in the eternal battlefield that is the Internet. From Firewalls…

Read More
10 Steps Defense-in-Depth
April 29, 2009

Judging by this year’s “Infosecurity Europe 2009″ event attendance at Earl’s Court, London, it becomes clear that despite the downturn economy,…

Read More
Info what?
March 26, 2009

A lot of people may be seeing more and more of the word “InfoSec” without really putting it in its right…

Read More