Identity and access management in Africa: SYLVERSYS & Atricore join forces
November 18, 2016US-based Atricore, Inc. is teaming up with Sylversys, bundling top tier security auditing capabilities with enterprise level identity and access management…
Read More5 Steps to Secure & Affordable Video Conferencing for SMBs
June 24, 2013STEP #1: Get the Setup right You will need the following in your meeting room: 1x TV or Video Projector 1x…
Read MoreSecurity considerations in Small and Medium Enterprises (SMEs)
June 27, 2012When comparing SMEs and Large Enterprises on Security, one element is found to be common to the two: They both utilize…
Read MoreAchieving Physical Security in 5 Steps
April 2, 2012We’ve all experienced these: Theft of a laptop or other portable device in a supposedly secured environment, theft of a server…
Read MoreThe Truth behind Zero-Day Attacks
April 7, 2010Zero-Days attacks represent the most frightful nightmares of all security concerns out there in the world. But first, let’s put a…
Read MoreSecurity in the Cloud -Should it be trusted?
November 27, 2009Cloud Computing! The acclaimed next-generation way of computing offers many benefits indeed. Leveraging both P2P (Peer-2-Peer) and Online collaboration technologies, Cloud…
Read MoreSecurity Match: Technology Vs. Attitude
August 21, 2009As technology evolves, more and more defense techniques are brought forth in the eternal battlefield that is the Internet. From Firewalls…
Read More10 Steps Defense-in-Depth
April 29, 2009Judging by this year’s “Infosecurity Europe 2009″ event attendance at Earl’s Court, London, it becomes clear that despite the downturn economy,…
Read MoreInfo what?
March 26, 2009A lot of people may be seeing more and more of the word “InfoSec” without really putting it in its right…
Read More