Articles
With around 200 million spam messages sent every day, increasing pressure is being placed on ISPs.
The final draft of the Protection of Personal Information Bill is pending.
Will companies cross the line from monitoring to policing?
The scourge becomes common as criminals master the Internet and take advantage of lax security prevalent in companies.
It is possible to monitor the activities of individuals, including off-site users linked to the network.
SIS describes a system's ability to keep a single copy of content that can be shared by many users.
Originally developed to protect data traffic between Web browsers and servers, SSL is now used to encrypt most data streams.
Increasingly elastic corporate boundaries necessitate the need for tight network access control.
By approaching security correctly, companies can enhance their potential in the e-business market, says Mike Hamilton, director of lines-of-business at Logical.
Mike Hamilton, director of lines of business at Logical, says Wireless Application Protocol (WAP) should form part of a broader information delivery strategy.