Information Security



Realtime prevention and detection of fraud a governance reality
June 2005
Every day across South Africa employees are busy stealing confidential company data and, bosses, in many cases, are not even aware the theft has taken place. Business and data security has become a critical ...

Read more...
Penetration testing - protection against risk
May 2005
Penetration testing has been a mainstay of IT security for several years and many people think they know what it involves. However, many people actually have a very loose understanding of what it needs ...

Read more...
Web security - a recipe for protection for Web services and applications
May 2005
Although most companies have some level of IT security in place, it is all too frequently the case that they are failing to address one of the fastest growing areas of vulnerability: security of their ...

Read more...
Identity theft in the corporate network
May 2005
The office cleaner wanders around the IT department emptying bins into a black plastic sack. He bends below each desk to look for stray sandwich wrappers and plastic cups. While he is under the desk, ...

Read more...
Intrusion protection: why it is needed, what is involved, what are the pitfalls and challenges?
May 2005
Intrusion protection takes the argument for intrusion detection one stage further, by not just discovering attacks on a network, but blocking and preventing them from happening again. With companies ...

Read more...
ISA 2004 protected by BitDefender
May 2005
BitDefender has announced the launch of BitDefender v2 for MS ISA Servers, a full-featured antivirus for Microsoft ISA 2000 and 2004 Servers. The newly launched product is aimed at SMBs and large corporate ...

Read more...
Pinpoint and eradicate digital threats
May 2005
Synaq, a Managed Linux Services company, is pleased to announce the availability of its managed e-mail security solution, Pinpoint Securemail, to the local market. This flexible solution, built on Open ...

Read more...
Endpoint security end game
April 2005
We have come up with 'seven signs' that can help any enterprise evaluate just how secure it is at the endpoint

Read more...
Benefits of tying into PV&P Africa
April 2005, News, Security Services & Risk Management
The fourth international exhibition of Pumps, Valves and Pipes Africa sees an exponential boom as three major water industry events join forces at Gallagher Estate in Johannesburg in June 2005.       Water ...

Read more...
Freedom from security
April 2005
Ian Schenkel, MD of Sygate EMEA, illustrates the security headaches that organisations face in the battle to enable mobile working, and puts forward a remedy that will ensure the integrity of corporate ...

Read more...
Johnson Controls launches new Cardkey P2000
April 2005
Johnson Controls has launched the latest version of the Cardkey P2000 security management systems, featuring a number of enhancements. In addition to a new remote redundancy option for increased system ...

Read more...
Companion chip simplifies integration of common interfaces
9 March 2005, Telecoms, Datacoms, Wireless, IoT, Integrated Solutions
A multifunction IC from Toshiba allows engineers to quickly and cost-effectively add a number of common interfaces to multimedia, networking, and other embedded applications. This single IC with PCI, ...

Read more...
New tiny AVR microcontroller members
9 March 2005, Altron Arrow, EBV Electrolink, DSP, Micros & Memory
Three new members have been added to the tinyAVR 8-pin family of Flash microcontrollers from Atmel. The devices offer three different Flash, EEPROM and SRAM combinations. The ATtiny25 has 2 KB of self-programmable ...

Read more...
ADSL: an appropriate solution
March 2005, Communications, Messaging, Security Services & Risk Management
While the hype surrounding the widespread availability of asynchronous digital subscriber line (ADSL) in South Africa in late 2002 soon dissipated into disappointed gripes about its poor performance, ...

Read more...
Security for systems in networked and standalone environments
February 2005
The Computer Security Institute 2003 Computer Crime and Security Survey suggests that in 2003 the severity and costs of attacks were down for the first time since 1999

Read more...
Unified approach needed for secure content management
February 2005
Content management embraces document imaging, output management, document management, workflow, business process management, collaboration, Web content management, e-mail management, digital rights management and rich media management

Read more...
The SA IT security market, 2003-2008
February 2005
The issue of corporate IT security has become a boardroom discussion. Due in part to regulatory and statutory requirements and policy frameworks, and also caused by the high profile security breaches ...

Read more...
Wireless technology a new threat to digital security?
February 2005
Companies urged to beef up security to avert being branded 'digital Parmalat'. Newer technologies such as wireless computers and mobile telephony are posing a security threat to organisations because ...

Read more...
Common criteria - salvation for e-mail security
February 2005
With the increasing threat of far more sophisticated attacks than just spam and viruses, e-mail security is taking a leap forward. But in implementing new solutions, organisations open up the risk to ...

Read more...
Maintaining integrity of your database is vital
February 2005
The rapid growth of the Internet and associated e-business opportunities, has spurred an urgent need for trusted e-security. With the advent of the Electronic Communication and Transactions Act (ECT ...

Read more...



<< First   < Previous   Page 70 of 80   Next >   Last >>