Cyber Security


Trends in digital evidence handling
May 2004
We still have no clear guidelines on access to sensitive material and this will lead to an unnecessary extra burden on the courts

Read more...
When downtime is not an option
February 2004
Magic Card is a powerful, instant recovery system technology for your PC. It provides you with the ultimate protection from any form of corruption or unwanted modification, accidental or intentional damage ...

Read more...
The top 10 Internet security scr*w ups!
December 2003
With over 10 years' experience defending against Internet security threats, Tom Salkield, managing director of NetConnect, has seen it all. NetConnect, part of Netstore plc, is one of the founders of ...

Read more...
How to prevent identity theft
August 2003
The news of a major financial institution suffering from a case of identity theft has left a bad taste in consumers' mouths regarding Internet banking. How did this happen and what can the man in the ...

Read more...
NamITech helps to secure Summit networks
November 2002
During the extensive build-up to the World Summit 2002, many valid concerns were raised about the security of the networks for the event and what the potential negative repercussions of a hack would be. ...

Read more...
Information security solution
September 2002
HID's pcProx desktop proximity reader - available locally from Honeywell-TeqTrader - has been integrated into a variety of third-party software offerings specifically geared towards information security. BioNetrix ...

Read more...
Well-defined security policies essential
December 2001
It is not enough merely to secure one's IT infrastructure - telephone systems, physical security and social engineering must also all be considered as part of a comprehensive security policy. "The best ...

Read more...
Access all areas
September 2001
The HR issue of security compliance can and should also supplement any technical safeguards as well motivated staff are less likely to transgress either intentionally or unintentionally

Read more...
New package to track IT assets
June 2001
Local company, FrontRange Solutions (FRS), recently announced the launch of HEAT Asset Tracker, aimed at keeping track of a company's IT investments. FRS is an international supplier of software for automating ...

Read more...
Price alteration: the latest crisis for online shopping
May 2001
e-commerce has received a body blow with the revelation that any user with a browser can alter prices of goods online and effectively get them for a steal. Ian Melamed, Chief Technology Officer of Satellitesafe, ...

Read more...
Network user interface
May 2001, IT infrastructure
The WJ-NT104 from Panasonic is fully equipped with image capture, JPEG and HTTP server functions. It can provide multiple site monitoring which can be conducted from multiple locations (PC), enabling ...

Read more...
One-stop solution to counter modern threats
March/April 2001
"There is a definite need to train and educate security staff regarding industrial espionage

Read more...
Secure m-commerce applications
March/April 2001
Comverse, a supplier of software and systems enabling network-based enhanced services, has announced the availability of a solution for end-to-end multi-access security for wireless Internet services. The ...

Read more...
Data, not hardware, is a company's most valuable asset
March/April 2000
During the first week of March, the offices of no less than six leading legal firms in Johannesburg's northern suburbs were burgled.

Read more...
MasterCard successfully processes during Leap Year Day 2000
March/April 2000
MasterCard reports the successful passing on leap day - 29 February 2000 - of another important 'Year 2000' milestone. Because of concerns that computers might misinterpret the value of '02/29/00', ...

Read more...
Data, not hardware, is a company's most valuable asset
March/April 2000
During the first week of March, the offices of no less than six leading legal firms in Johannesburg's northern suburbs were burgled. Just another South African crime statistic, one may ask? "No, almost ...

Read more...
28 frightening IT facts
July '99
The recently released 1999 CSI/FBI Computer Crime Survey details what 521 companies from various industries and of various sizes are doing to secure their computer systems. The results highlight why security ...

Read more...



<< First   < Previous   Page 46 of 46