Information Security



Universal password authentication
March 2007
More research and development is necessary for the concept of universal password authentication systems to work. Universal password authentication systems that allow users to log in once and then hop ...

Read more...
Top hacker secrets .... exposed!
February 2007
The most common hacker is actually someone working in your organisation today

Read more...
Five good reasons to monitor the behaviour of employees
February 2007
In many ways, digital communication is out of control in most organisations. Changes in the business, technology and security landscape have brought about a hitherto neglected issue on employee communications ...

Read more...
Operating in a security conscious market
February 2007
The IT security market continues to be influenced by issues like social engineering, identity theft and compliance with legislation. Corporate South Africa should associate IT security with more than ...

Read more...
Super power passwords: the threat from within
December 2006
We have all heard the term 'administrative passwords' these are the `super power passwords' that sit behind every workstation – it is the password that once you know it you have access to the network ...

Read more...
Hackers heaven as corporates still leave security back doors open
November 2006
Identity and access management technology offers total access control by applying a single security policy to all access methods, globally, which greatly simplifies rollout and enforcement

Read more...
IT security at home
November 2006
Threats to information security are not exclusively targeted at the corporate network. Many blended threats and attacks of late rely on the curiosity and apathy of home users. There are some practical ...

Read more...
UK companies still risk electronic identity theft
November 2006
A new survey has shown that 99% of UK companies are still not implementing all the safeguards available to them to manage and control access for the right users to their systems and reduce the risk of ...

Read more...
Lost property: 40% of mobile devices left at airports will never be reclaimed
October 2006
A survey into ‘Mobile device security at airports’ shows the Brits are lackadaisical – when it comes to losing mobile devices compared to many of their counterparts around the globe. British travellers ...

Read more...
Single sign-on includes physical access
August 2006
The convergence of physical and logical security has taken a step forward with the introduction of Imprivata's single sign-on solutions. A US-based company, Imprivata develops single sign-on solutions ...

Read more...
Open standard predicted to dominate industrial networks
August 2006, Schneider Electric South Africa, Fieldbus & Industrial Networking
The standards-based Industrial Ethernet will come to dominate virtually every area of industrial network communications, even those where end users are presently satisfied with their fieldbus and similar ...

Read more...
New interpreter for AS-Interface
August 2006, Siemens South Africa, Fieldbus & Industrial Networking
Siemens Automation and Drives (A&D) now offers a new DP/AS-i Link Advanced for simple linking of the communication networks of Profibus and AS-interface. The routers in accordance with AS-i Spec. 3.0 ...

Read more...
Combating identity theft
July 2006
Identity theft is the major security concern facing organisations today. Indeed, for the banking industry, it is the number one security priority for 2006. In a recent survey1 of security budget holders ...

Read more...
How to justify expenditure to solve a problem you do not or rarely have
July 2006
A major challenge for any security team these days is to justify allocating IT budget to address a problem that rarely occurs. Generally, more tactical operational tasks take priority over security projects ...

Read more...
Top 10 security predictions for 2006
March 2006
As the importance of information security continues to rise, organisations around the globe are looking at revising their existing strategies to ensure that their information assets are optimally secured. ...

Read more...
Network appliances arrive bearing gifts for security managers
March 2006
There is a technological revolution taking place in the design of integrated security systems, and once you understand it you will want to be part of it. A scant five years ago, the more advanced security ...

Read more...
Senior executives information security survival kit
March 2006
Specific information security risks for senior executives    The following examples show how senior executives can be exposed to information security risks:    * Lack of appreciation of what risks are most ...

Read more...
The convergence of physical security and IT: business rules and the integration of physical and logical security
February 2006
Without sufficient security measures - both physical and logical - data can be stolen without the data owner's knowledge

Read more...
Clearline SS40 range gets SABS rating
25 January 2006, Clearline Protection Systems, News
Clearline recently obtained full accreditation to manufacture a range of surge arresters to SANa643-1 which carry the SABS mark. Pictured here receiving the certificate is Wynand Brits, principal auditor ...

Read more...
Next-generation installer support for the IP world
December 2005
The following article presents a few of the new programs and techniques that an installer can begin to expect to see offered from their IP-security distributor

Read more...



<< First   < Previous   Page 68 of 80   Next >   Last >>