Security

4 years 3 weeks ago
5
Check out these courses offered by www.coursera.org , all provided in collaboration with the University of Washington. Building an Information Risk Management Toolkit In this course, you will explore...
Cover: 2013 CYBER-CRIME , HACKING AND MALWARE Report
4 years 2 months ago
0
As economies and technology thrive across Africa, IDG Connect investigates the state of cyber threats across the four corners of the continent. With spotlights on Egypt, South Africa, Kenya and...
Year of Publication: 
Author(s): 
Location: 
Cover: Microsoft Security Intelligence Report - v14 (June - December 2012)
4 years 7 months ago
0
Microsofts Security Intelligence Report intends to provide comprehensive global threat intelligence and guidance to help enterprises manage risk and address security challenges. The new report...
Year of Publication: 
Author(s): 
Location: 
4 years 7 months ago
0
Microsofts Security Intelligence Report intends to provide comprehensive global threat intelligence and guidance to help enterprises manage risk and address security challenges. The new report...
Location: 
4 years 9 months ago
0
The Democratic Alliance has accused the executive committee of the Special Investigating Unit (SIU) of hacking the emails of its own staff to prevent any further scandal at the state anti-corruption...
Location: 
4 years 10 months ago
5
While the majority of global companies support the bring your own device (BYOD) trend and have policies in place to govern the rise of consumerisation, SA is far behind – with only 5% of local...
Location: 
5 years 1 month ago
0
Bring your own device (BYOD) is an ever-increasing global trend that poses security risks for companies, although being a convenience to employees. Just as the advent of the Internet has enabled...
Location: 
Cover: Information Technology Policy (Email, Security, Equipment etc) from GTM
5 years 1 month ago
0
It is the responsibility of the Information Technology Division under the Corporate Services Department to ensure that policies, procedures and standards regarding computer-related items are defined...
Year of Publication: 
Municipal Functions: 
Location: 
5 years 1 month ago
0
Cloud technology has taken off in South Africa, although there are still those who believe that it is still early days Cloud technology has taken off in South Africa, although there are still those...
Location: 
Cover: Best Practices and Applications of TLS/SSL
5 years 1 month ago
0
The most well-known example of the use of public key infrastructure has proven flexible enough to assist in authentication, encryption and data integrity in numerous applications throughout the...
Year of Publication: 
Author(s): 
Location: 

Pages