Quantcast
Channel: Technology Areas Archives - IT-Online
Browsing all 9886 articles
Browse latest View live

Are contactless cards cloneable?

The security community has been demonstrating successful cloning of contactless transactions since at least 2012. Full cloning of cards is not possible, and current cloning methods can only rely on...

View Article


Combatting the ‘evil Internet of Things’

A recent survey of over 400 global IT security pros revealed that fears over the security of connected devices has risen sharply since last year, writes Peter Reid, executive head of Intervate. In all,...

View Article


New courier crew offers convenience

Need to get a package across town in a hurry? Time is tight and you’re struggling? Well, now there’s a new courier crew in town. 1Fetch, a new on-demand, same-day, hand-to-hand motorbike delivery...

View Article

Sneak peek at new travel platform

Sabre has given travel consultants and suppliers across the airline, hotel, rail, cruise and car rental industries a sneak peek at its new Sabre Red Workspace. The software solution will harness the...

View Article

BIPB to improve Mr Price and Daly operations

Mr Price, Chep and Daly are benefitting from BIPB’s data intelligence offering. New projects include the crunching of data on credits and returns instore to present Mr Price with information in a...

View Article


BDO cyber lab to combat crime

As of June 2015, South Africa was one of only 28 countries in the world with a cybersecurity policy in place. Although a heavily criticised policy, it shows that government recognises the dangers of...

View Article

Not that easy to destroy data

Companies must have the necessary contingency plans in the event of a breach to ensure they can protect sensitive data. Xperien has developed secure processes for destroying data from redundant hard...

View Article

Self-service HR kiosks generate big benefits

Local HR software vendor, SmartHR, has developed a self-service kiosk that will enable an organisations’ disconnected workforce to update personal information on their company HR systems, apply for...

View Article


How SMMEs can maximise IT security

As the bulk of the South African economy is made up of SMMEs, it is important that cash-strapped IT managers take steps to ensure that their businesses are protected against malicious attacks. Steve...

View Article


Analytics to cut the cost of data centre cooling

Fujitsu Laboratories has developed highly accurate predictive technology for such metrics as temperature and humidity, enabling energy-saving operations of air-conditioning equipment in data centres....

View Article

Common misconceptions around information security

Every time the headlines flood with a new story about a breach at a major organisation, the assumption is that the attackers got in due to a high level of sophistication, or through careful studying of...

View Article

Five common misconceptions about CX

While some South African companies have opened themselves to the opportunities offered by customer experience (CX), many either do not fully understand it or simply see it as a bolt-on to existing...

View Article

Big increase in active malware families

Check Point Software Technologies has published its latest Threat Index for May 2016, revealing that the number of active global malware families increased by 15% in May 2016. The May Threat Index...

View Article


HP Inc makes business printing mobile, secure

HP Inc has announced new mobile and business intelligence software to help business IT managers make their print environment more mobile, secure and productive. The new offerings include: * Mobile...

View Article

How many cyber-heists go unreported?

Between the hours of 5am and 8am Japan time on 15 May last month, cyber attackers used compromised card details of customers from a Tier 1 bank in Africa to make transactions on a number of customer...

View Article


MDM presents big data conference

Master Data Management (MDM) MD Gary Allemann, will be presenting at the Big Data & Analytics Conference, running from 12 to 13 July 2016 at the Indaba Hotel in Sandton, Johannesburg. He will cover...

View Article

How to address critical infrastructure vulnerabilities

Almost 80% of industrial security incidents in critical infrastructure organisations are caused by unintentional internal issues such as software misconfigurations from human error and malfunctioning...

View Article


Take action now to prevent water, energy shortages

South Africa’s water and energy challenges are well known and range from ageing infrastructure, supply constraints and pollution to the impact of climate change on society and businesses, writes Karl...

View Article

Software AG debuts Apama Community Edition

Software AG has announced the availability of Apama Community Edition, a free version of the Apama Streaming Analytics platform, that enables developers to download the Apama software, build streaming...

View Article

Cyber-security is an ongoing battle

The ‘Nigerian Prince’ or ‘419’ email scams we’ve all seen take advantage of the age-old premise: people can be greedy and gullible. Or to put it more positively – people are intrinsically positive...

View Article
Browsing all 9886 articles
Browse latest View live