Information Security



The Test & Measurement 2005 - Conference and Exhibition
10 August 2005, News
The Test & Measurement 2005 - Conference and Exhibition will be held at Emperors Palace, (formerly Caesars Gauteng) on 5-7 September 2005.       Conference This year, there will be a diversity of papers ...

Read more...
USB/AC power management IC has advanced safety features
10 August 2005, Altron Arrow, Power Electronics / Power Management
National Semiconductor has introduced a very small, single-chip, dual-input USB/AC battery charger and power management IC that it claims safely charges and maintains single-cell Lithium-ion (Li-Ion) ...

Read more...
Antennas for wireless applications
27 July 2005, Electrocomp, Telecoms, Datacoms, Wireless, IoT
Blue 2.4 is the latest product offering from Amphenol AMEA. Blue 2.4 is specifically manufactured for Bluetooth and IEEE802.11b (WiFi) applications in indoors application. This off-the-shelf product takes ...

Read more...
Dynamic power factor correction offers benefits
13 July 2005, Electrocomp, Circuit & System Protection
Conventional power factor correction (PFC) systems consist of a power factor controller and power capacitors. They are connected to the power line via electromechanical capacitor switching contactors. ...

Read more...
How well do you know your partner?
July 2005
Today our businesses depend on the exchange of electronic information with our business partners but many of the mechanisms that are used still rely too much on the goodwill of our business partners, or the integrity of the systems that they use

Read more...
Surge protection for electrical sockets
July 2005, Phoenix Contact , Electrical Power & Protection
The Sockettrab BT-SKT 230 AC Class 3 surge protector from Phoenix Contact is suitable for all types of sockets around the world, regardless of the socket brand or type. The module is saddled onto the ...

Read more...
New SAS Forecast Server
July 2005, Software Solutions
Saving money and increasing sales are important objectives for any business. With these goals in mind, SAS has announced that it will deliver its forecasting product, SAS Forecast Server to help companies ...

Read more...
Nerd, techie, specialist, guru or expert ... which do you need?
June 2005
The terms that we already use everyday are examined: novice, nerd, techie, specialist, mentor, expert, guru and genius

Read more...
The seven deadly sins of real-world backups
June 2005
Businesses can contract a third-party backup storage specialisation company that offers best practice-based services that apply internationally recognised and accepted processes

Read more...
Confessions of a CTO
June 2005
The bottom line is that many organisations today are frighteningly exposed when it comes to the security of sensitive information within their organisations, and they simply have no idea how to solve the problem

Read more...
Affordable frequency
June 2005, News & Events
If you are currently paying a monthly rental for each transmitter on your alarm network, you are probably being ripped off! Affordable frequency usage is however available right now, thanks to RDC. RDC ...

Read more...
Local, integrated access control
June 2005, Access Control & Identity Management
Building upon a wealth of experience gained through the development of System 42 and associated hardware (Syclon), Entex introduces a locally developed product capable of delivering the latest access ...

Read more...
Security and safety enhanced by a lock
June 2005, Products & Solutions
The UniLock system strikes a balance between traditional physical security and advanced electronic technology that allows for full audit trails and selected access times to be programmed. Locally developed ...

Read more...
Hardware compression vs software compression
June 2005
Since the beginning of digital CCTV there has been a division between the embedded and the PC-based systems. Both parties have valid arguments as to what qualities make theirs best. One of the key differences ...

Read more...
Realtime prevention and detection of fraud a governance reality
June 2005
Every day across South Africa employees are busy stealing confidential company data and, bosses, in many cases, are not even aware the theft has taken place. Business and data security has become a critical ...

Read more...
Penetration testing - protection against risk
May 2005
Penetration testing has been a mainstay of IT security for several years and many people think they know what it involves. However, many people actually have a very loose understanding of what it needs ...

Read more...
Web security - a recipe for protection for Web services and applications
May 2005
Although most companies have some level of IT security in place, it is all too frequently the case that they are failing to address one of the fastest growing areas of vulnerability: security of their ...

Read more...
Identity theft in the corporate network
May 2005
The office cleaner wanders around the IT department emptying bins into a black plastic sack. He bends below each desk to look for stray sandwich wrappers and plastic cups. While he is under the desk, ...

Read more...
Intrusion protection: why it is needed, what is involved, what are the pitfalls and challenges?
May 2005
Intrusion protection takes the argument for intrusion detection one stage further, by not just discovering attacks on a network, but blocking and preventing them from happening again. With companies ...

Read more...
ISA 2004 protected by BitDefender
May 2005
BitDefender has announced the launch of BitDefender v2 for MS ISA Servers, a full-featured antivirus for Microsoft ISA 2000 and 2004 Servers. The newly launched product is aimed at SMBs and large corporate ...

Read more...



<< First   < Previous   Page 76 of 87   Next >   Last >>








While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.