Information Security



One security policy to rule them all: securing the remote workforce
February 2008
Lifestyles and values have changed – and so has the workplace. A remote workforce has become a vital part of most organisations' operations. The benefits? Workers are more productive, the company does ...

Read more...
The security paradox
December 2007
An emerging security paradox: the gap between awareness of the problem and support for the solution

Read more...
The new challenge of M2M
December 2007
There are several trends shaping the future of machine-to-machine (M2M) technology, including the move toward true autonomous control of networked equipment and a greater level of intelligence built into the machine infrastructure

Read more...
Composite approach critical to effective security
December 2007
Organisations struggle to find the resources to maintain a balance between security and operations. But automated, integrated security management enables organisations to set up an immediate framework ...

Read more...
IT governance success strategies
December 2007
Defined and measurable objectives, aligned with the broader business, supported by top management. The concept of IT Governance is a hotly debated issue with company executives currently demonstrating ...

Read more...
Evolution of anti-virus is forcing security beyond the gateway
November 2007
Anti-virus is no longer simply anti-virus. This hugely influential market has changed significantly, driven by efforts of IT security solution providers to measure up to sophistication in digital threats ...

Read more...
Spyware and viruses - two separate problems requiring separate defences
August 2007
To the untrained eye, spyware and computer viruses may appear to be one and the same but in actual fact there are vast differences between the two. Companies need to understand what the differences are ...

Read more...
FxSecure Key
August 2007
RCG Systems SA has launched its latest data security product, FxSecure Key, aimed at the consumer market. Using a wireless connection, it allows notebook users to retain the ability, when not in possession ...

Read more...
Single sign-on
July 2007, G2 Fire
As computers are getting increasingly mobile and better connected, threats to data security are increasing in number as well as complexity. Business customers, for whom data security can have a direct ...

Read more...
Logical security
June 2007
Information technology is undoubtedly playing an increasingly important role at educational facilities, and with this comes the ever-present threat of online security issues.       Security threats facing ...

Read more...
DSC T-Link TL250
June 2007, Elvey Security Technologies
The TL250 uses the latest digital networking technologies to provide secure Internet communications over a private network (LAN/WAN) or the Internet between the control panel and the Sur-Gard System III ...

Read more...
DIN connectors redesigned
16 May 2007, Actum Electronics, Interconnection
Erni is introducing a new design to its female DIN connectors, which it says has certain advantages compared to the old manufacturing process. These include: reduction of press-in force by approx. 25% ...

Read more...
New Epson A3 photo printer
April 2007, PCs & Workstations
Epson has unveiled three new lightweight 3LCD projectors with market leading technology for the business and education markets. The EMP-1715 is the smallest and lightest, high-brightness wireless projector ...

Read more...
ESD-protected RS485/422 transceivers with high noise immunity
4 April 2007, Altron Arrow, Power Electronics / Power Management
Intersil's ISL315XE series of ICs are BiCMOS, IEC61000 ESD-protected, 5 V powered, single transceivers that meet both the RS485 and RS422 standards for balanced communication. Each driver output and receiver ...

Read more...
microSD connectors offer space savings and card extraction protection
21 March 2007, Interconnection, Security Services & Risk Management
A new series of microSD memory card connectors from Molex offer ultra compact space savings and a brake feature for smooth card extraction. These connectors are designed for cellphones and other mobile ...

Read more...
Botox and IT security: is it too late for you?
March 2007
Botox your policies before it is too late

Read more...
ID theft
March 2007
Identity theft has emerged as a significant threat within information security today.    The action of gathering and manipulating personal information for criminal purposes is a disturbing trend that ...

Read more...
Universal password authentication
March 2007
More research and development is necessary for the concept of universal password authentication systems to work. Universal password authentication systems that allow users to log in once and then hop ...

Read more...
Top hacker secrets .... exposed!
February 2007
The most common hacker is actually someone working in your organisation today

Read more...
Five good reasons to monitor the behaviour of employees
February 2007
In many ways, digital communication is out of control in most organisations. Changes in the business, technology and security landscape have brought about a hitherto neglected issue on employee communications ...

Read more...



<< First   < Previous   Page 72 of 85   Next >   Last >>








While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.