Cyber Security


Realtime prevention and detection of fraud a governance reality
June 2005
Every day across South Africa employees are busy stealing confidential company data and, bosses, in many cases, are not even aware the theft has taken place. Business and data security has become a critical ...

Read more...
Penetration testing - protection against risk
May 2005
Penetration testing has been a mainstay of IT security for several years and many people think they know what it involves. However, many people actually have a very loose understanding of what it needs ...

Read more...
Web security - a recipe for protection for Web services and applications
May 2005
Although most companies have some level of IT security in place, it is all too frequently the case that they are failing to address one of the fastest growing areas of vulnerability: security of their ...

Read more...
Identity theft in the corporate network
May 2005
The office cleaner wanders around the IT department emptying bins into a black plastic sack. He bends below each desk to look for stray sandwich wrappers and plastic cups. While he is under the desk, ...

Read more...
Intrusion protection: why it is needed, what is involved, what are the pitfalls and challenges?
May 2005
Intrusion protection takes the argument for intrusion detection one stage further, by not just discovering attacks on a network, but blocking and preventing them from happening again. With companies ...

Read more...
ISA 2004 protected by BitDefender
May 2005
BitDefender has announced the launch of BitDefender v2 for MS ISA Servers, a full-featured antivirus for Microsoft ISA 2000 and 2004 Servers. The newly launched product is aimed at SMBs and large corporate ...

Read more...
Pinpoint and eradicate digital threats
May 2005
Synaq, a Managed Linux Services company, is pleased to announce the availability of its managed e-mail security solution, Pinpoint Securemail, to the local market. This flexible solution, built on Open ...

Read more...
Endpoint security end game
April 2005
We have come up with 'seven signs' that can help any enterprise evaluate just how secure it is at the endpoint

Read more...
Freedom from security
April 2005
Ian Schenkel, MD of Sygate EMEA, illustrates the security headaches that organisations face in the battle to enable mobile working, and puts forward a remedy that will ensure the integrity of corporate ...

Read more...
Johnson Controls launches new Cardkey P2000
April 2005, Johnson Controls
Johnson Controls has launched the latest version of the Cardkey P2000 security management systems, featuring a number of enhancements. In addition to a new remote redundancy option for increased system ...

Read more...
Security for systems in networked and standalone environments
February 2005
The Computer Security Institute 2003 Computer Crime and Security Survey suggests that in 2003 the severity and costs of attacks were down for the first time since 1999

Read more...
Unified approach needed for secure content management
February 2005
Content management embraces document imaging, output management, document management, workflow, business process management, collaboration, Web content management, e-mail management, digital rights management and rich media management

Read more...
The SA IT security market, 2003-2008
February 2005
The issue of corporate IT security has become a boardroom discussion. Due in part to regulatory and statutory requirements and policy frameworks, and also caused by the high profile security breaches ...

Read more...
Wireless technology a new threat to digital security?
February 2005
Companies urged to beef up security to avert being branded 'digital Parmalat'. Newer technologies such as wireless computers and mobile telephony are posing a security threat to organisations because ...

Read more...
Common criteria - salvation for e-mail security
February 2005
With the increasing threat of far more sophisticated attacks than just spam and viruses, e-mail security is taking a leap forward. But in implementing new solutions, organisations open up the risk to ...

Read more...
Maintaining integrity of your database is vital
February 2005
The rapid growth of the Internet and associated e-business opportunities, has spurred an urgent need for trusted e-security. With the advent of the Electronic Communication and Transactions Act (ECT ...

Read more...
LSNs - local security networks
February 2005
Conceptually, a local security network (or LSN) offers the foundation for a security architecture, with flexiblity being the operative word. LSNs can be applied to a wide variety of fire and intrusion ...

Read more...
TSI anti-spam service reduces unwanted mail by 95%
February 2005
TSI has become the first local service provider to launch an anti-spam service that can reduce unwanted e-mail down to 5% of that usually received. Michael Brunzlik, MD at TSI, says while some Internet ...

Read more...
Microsoft launches spyware and virus killers
February 2005
Microsoft has launched two new solutions that will provide added protection against spyware and malicious software. Customers now can download the first beta version of Microsoft Windows AntiSpyware, ...

Read more...
PC-cillin Internet Security 2005
February 2005
SecureData, a member of the JSE-listed ERP.com Group has announced the availability of Trend Micro PC-cillin Internet Security 2005. PC-cillin Internet Security 2005 now features additional privacy, reliability, ...

Read more...



<< First   < Previous   Page 46 of 50   Next >   Last >>