Cyber Security


Identity theft in the corporate network
June 2004
The office cleaner wanders around the IT department emptying bins into a black plastic bag. He bends below each desk to look for stray sandwich wrappers and plastic cups. While he is under the desk, it ...

Read more...
Early alerting - the key to proactive security
May 2004
A study conducted by Qualys and released in July, that correlated nearly 1,5 million scans over the course of a year and a half, found that 80% of exploits are released within 60 days of a vulnerability's announcement

Read more...
The truth about online payment methods and who carries the risk
May 2004
Online purchasing can become a confusing process for some shoppers - from finding the online store, to choosing the right product and then having to decide on which payment method to use. Although there ...

Read more...
Trends in digital evidence handling
May 2004
We still have no clear guidelines on access to sensitive material and this will lead to an unnecessary extra burden on the courts

Read more...
When downtime is not an option
February 2004
Magic Card is a powerful, instant recovery system technology for your PC. It provides you with the ultimate protection from any form of corruption or unwanted modification, accidental or intentional damage ...

Read more...
The top 10 Internet security scr*w ups!
December 2003
With over 10 years' experience defending against Internet security threats, Tom Salkield, managing director of NetConnect, has seen it all. NetConnect, part of Netstore plc, is one of the founders of ...

Read more...
How to prevent identity theft
August 2003
The news of a major financial institution suffering from a case of identity theft has left a bad taste in consumers' mouths regarding Internet banking. How did this happen and what can the man in the ...

Read more...
NamITech helps to secure Summit networks
November 2002
During the extensive build-up to the World Summit 2002, many valid concerns were raised about the security of the networks for the event and what the potential negative repercussions of a hack would be. ...

Read more...
Information security solution
September 2002
HID's pcProx desktop proximity reader - available locally from Honeywell-TeqTrader - has been integrated into a variety of third-party software offerings specifically geared towards information security. BioNetrix ...

Read more...
Well-defined security policies essential
December 2001
It is not enough merely to secure one's IT infrastructure - telephone systems, physical security and social engineering must also all be considered as part of a comprehensive security policy. "The best ...

Read more...
Access all areas
September 2001
The HR issue of security compliance can and should also supplement any technical safeguards as well motivated staff are less likely to transgress either intentionally or unintentionally

Read more...
New package to track IT assets
June 2001
Local company, FrontRange Solutions (FRS), recently announced the launch of HEAT Asset Tracker, aimed at keeping track of a company's IT investments. FRS is an international supplier of software for automating ...

Read more...
Price alteration: the latest crisis for online shopping
May 2001
e-commerce has received a body blow with the revelation that any user with a browser can alter prices of goods online and effectively get them for a steal. Ian Melamed, Chief Technology Officer of Satellitesafe, ...

Read more...
Network user interface
May 2001, IT infrastructure
The WJ-NT104 from Panasonic is fully equipped with image capture, JPEG and HTTP server functions. It can provide multiple site monitoring which can be conducted from multiple locations (PC), enabling ...

Read more...
One-stop solution to counter modern threats
March/April 2001
"There is a definite need to train and educate security staff regarding industrial espionage

Read more...
Secure m-commerce applications
March/April 2001
Comverse, a supplier of software and systems enabling network-based enhanced services, has announced the availability of a solution for end-to-end multi-access security for wireless Internet services. The ...

Read more...
Data, not hardware, is a company's most valuable asset
March/April 2000
During the first week of March, the offices of no less than six leading legal firms in Johannesburg's northern suburbs were burgled.

Read more...
MasterCard successfully processes during Leap Year Day 2000
March/April 2000
MasterCard reports the successful passing on leap day - 29 February 2000 - of another important 'Year 2000' milestone. Because of concerns that computers might misinterpret the value of '02/29/00', ...

Read more...
Data, not hardware, is a company's most valuable asset
March/April 2000
During the first week of March, the offices of no less than six leading legal firms in Johannesburg's northern suburbs were burgled. Just another South African crime statistic, one may ask? "No, almost ...

Read more...
28 frightening IT facts
July '99
The recently released 1999 CSI/FBI Computer Crime Survey details what 521 companies from various industries and of various sizes are doing to secure their computer systems. The results highlight why security ...

Read more...



<< First   < Previous   Page 42 of 42