Realtime prevention and detection of fraud a governance reality June 2005 Every day across South Africa employees are busy stealing confidential company data and, bosses, in many cases, are not even aware the theft has taken place.
Business and data security has become a critical ...
Penetration testing - protection against risk May 2005 Penetration testing has been a mainstay of IT security for several years and many people think they know what it involves. However, many people actually have a very loose understanding of what it needs ...
Identity theft in the corporate network May 2005 The office cleaner wanders around the IT department emptying bins into a black plastic sack. He bends below each desk to look for stray sandwich wrappers and plastic cups. While he is under the desk, ...
ISA 2004 protected by BitDefender May 2005 BitDefender has announced the launch of BitDefender v2 for MS ISA Servers, a full-featured antivirus for Microsoft ISA 2000 and 2004 Servers. The newly launched product is aimed at SMBs and large corporate ...
Pinpoint and eradicate digital threats May 2005 Synaq, a Managed Linux Services company, is pleased to announce the availability of its managed e-mail security solution, Pinpoint Securemail, to the local market. This flexible solution, built on Open ...
Benefits of tying into PV&P Africa April 2005, News, Security Services & Risk Management The fourth international exhibition of Pumps, Valves and Pipes Africa sees an exponential boom as three major water industry events join forces at Gallagher Estate in Johannesburg in June 2005. Water ...
Freedom from security April 2005 Ian Schenkel, MD of Sygate EMEA, illustrates the security headaches that organisations face in the battle to enable mobile working, and puts forward a remedy that will ensure the integrity of corporate ...
Johnson Controls launches new Cardkey P2000 April 2005 Johnson Controls has launched the latest version of the Cardkey P2000 security management systems, featuring a number of enhancements. In addition to a new remote redundancy option for increased system ...
Companion chip simplifies integration of common interfaces 9 March 2005, Telecoms, Datacoms, Wireless, IoT, Integrated Solutions A multifunction IC from Toshiba allows engineers to quickly and cost-effectively add a number of common interfaces to multimedia, networking, and other embedded applications. This single IC with PCI, ...
New tiny AVR microcontroller members 9 March 2005, Altron Arrow, EBV Electrolink, DSP, Micros & Memory Three new members have been added to the tinyAVR 8-pin family of Flash microcontrollers from Atmel. The devices offer three different Flash, EEPROM and SRAM combinations. The ATtiny25 has 2 KB of self-programmable ...
ADSL: an appropriate solution March 2005, Communications, Messaging, Security Services & Risk Management While the hype surrounding the widespread availability of asynchronous digital subscriber line (ADSL) in South Africa in late 2002 soon dissipated into disappointed gripes about its poor performance, ...
Unified approach needed for secure content management February 2005 Content management embraces document imaging, output management, document management, workflow, business process management, collaboration, Web content management, e-mail management, digital rights management and rich media management
The SA IT security market, 2003-2008 February 2005 The issue of corporate IT security has become a boardroom discussion. Due in part to regulatory and statutory requirements and policy frameworks, and also caused by the high profile security breaches ...
Wireless technology a new threat to digital security? February 2005 Companies urged to beef up security to avert being branded 'digital Parmalat'.
Newer technologies such as wireless computers and mobile telephony are posing a security threat to organisations because ...
Common criteria - salvation for e-mail security February 2005 With the increasing threat of far more sophisticated attacks than just spam and viruses, e-mail security is taking a leap forward. But in implementing new solutions, organisations open up the risk to ...
Maintaining integrity of your database is vital February 2005 The rapid growth of the Internet and associated e-business opportunities, has spurred an urgent need for trusted e-security.
With the advent of the Electronic Communication and Transactions Act (ECT ...