Are contactless cards cloneable?
The security community has been demonstrating successful cloning of contactless transactions since at least 2012. Full cloning of cards is not possible, and current cloning methods can only rely on...
View ArticleCombatting the ‘evil Internet of Things’
A recent survey of over 400 global IT security pros revealed that fears over the security of connected devices has risen sharply since last year, writes Peter Reid, executive head of Intervate. In all,...
View ArticleNew courier crew offers convenience
Need to get a package across town in a hurry? Time is tight and you’re struggling? Well, now there’s a new courier crew in town. 1Fetch, a new on-demand, same-day, hand-to-hand motorbike delivery...
View ArticleSneak peek at new travel platform
Sabre has given travel consultants and suppliers across the airline, hotel, rail, cruise and car rental industries a sneak peek at its new Sabre Red Workspace. The software solution will harness the...
View ArticleBIPB to improve Mr Price and Daly operations
Mr Price, Chep and Daly are benefitting from BIPB’s data intelligence offering. New projects include the crunching of data on credits and returns instore to present Mr Price with information in a...
View ArticleBDO cyber lab to combat crime
As of June 2015, South Africa was one of only 28 countries in the world with a cybersecurity policy in place. Although a heavily criticised policy, it shows that government recognises the dangers of...
View ArticleNot that easy to destroy data
Companies must have the necessary contingency plans in the event of a breach to ensure they can protect sensitive data. Xperien has developed secure processes for destroying data from redundant hard...
View ArticleSelf-service HR kiosks generate big benefits
Local HR software vendor, SmartHR, has developed a self-service kiosk that will enable an organisations’ disconnected workforce to update personal information on their company HR systems, apply for...
View ArticleHow SMMEs can maximise IT security
As the bulk of the South African economy is made up of SMMEs, it is important that cash-strapped IT managers take steps to ensure that their businesses are protected against malicious attacks. Steve...
View ArticleAnalytics to cut the cost of data centre cooling
Fujitsu Laboratories has developed highly accurate predictive technology for such metrics as temperature and humidity, enabling energy-saving operations of air-conditioning equipment in data centres....
View ArticleCommon misconceptions around information security
Every time the headlines flood with a new story about a breach at a major organisation, the assumption is that the attackers got in due to a high level of sophistication, or through careful studying of...
View ArticleFive common misconceptions about CX
While some South African companies have opened themselves to the opportunities offered by customer experience (CX), many either do not fully understand it or simply see it as a bolt-on to existing...
View ArticleBig increase in active malware families
Check Point Software Technologies has published its latest Threat Index for May 2016, revealing that the number of active global malware families increased by 15% in May 2016. The May Threat Index...
View ArticleHP Inc makes business printing mobile, secure
HP Inc has announced new mobile and business intelligence software to help business IT managers make their print environment more mobile, secure and productive. The new offerings include: * Mobile...
View ArticleHow many cyber-heists go unreported?
Between the hours of 5am and 8am Japan time on 15 May last month, cyber attackers used compromised card details of customers from a Tier 1 bank in Africa to make transactions on a number of customer...
View ArticleMDM presents big data conference
Master Data Management (MDM) MD Gary Allemann, will be presenting at the Big Data & Analytics Conference, running from 12 to 13 July 2016 at the Indaba Hotel in Sandton, Johannesburg. He will cover...
View ArticleHow to address critical infrastructure vulnerabilities
Almost 80% of industrial security incidents in critical infrastructure organisations are caused by unintentional internal issues such as software misconfigurations from human error and malfunctioning...
View ArticleTake action now to prevent water, energy shortages
South Africa’s water and energy challenges are well known and range from ageing infrastructure, supply constraints and pollution to the impact of climate change on society and businesses, writes Karl...
View ArticleSoftware AG debuts Apama Community Edition
Software AG has announced the availability of Apama Community Edition, a free version of the Apama Streaming Analytics platform, that enables developers to download the Apama software, build streaming...
View ArticleCyber-security is an ongoing battle
The ‘Nigerian Prince’ or ‘419’ email scams we’ve all seen take advantage of the age-old premise: people can be greedy and gullible. Or to put it more positively – people are intrinsically positive...
View Article