IT/Networking Columns & Features Archive

  • IP 101 Tutorial – Multicasting

    DO YOU KNOW the difference between IP broadcast and multicast? When is it appropriate to use multicasting for network video transmission? This month’s column is a quick tutorial on the basic methods of IP data transmission: unicast, broadcast and...

    Article • March 10th, 2009

  • Exaprotect warns IT industry to secure virtual networks

    Recent examples of pirated Apple software exposes vulnerabilities of networks

    Article • January 28th, 2009

  • Know What to Keep

    Preserving Electronically Stored Information for Litigation and Investigations

    Article • January 27th, 2009

  • Wireless Security - Does it still matter?

    While many companies have addressed the issue, not everyone is secure

    Article • January 27th, 2009

  • H.264 – Does It Live Up to the Hype?

    The race to provide video surveillance products with H.264 compression has started.  Manufacturers are adopting this standard compression for digital video recorders, network cameras and video encoders with the promise to reduce video data by up to 50...

    Article • January 27th, 2009

  • Beware of the ‘NAT’

    Advances in video compression and the availability of high speed Internet have made remote video monitoring more practical and in high demand from end-users. The typical application for small business owners involves using a PC to access live and...

    Article • January 27th, 2009

  • Log Management for Regulatory Compliance

    Compliance can start with monitoring your network traffic

    Article • January 27th, 2009

  • 10 Ways to Protect Your Web Servers

    Organizations can be vulnerable to thousands of Web-based attacks without protection

    Article • January 27th, 2009

  • Get Certified?

    The real deal with Information Security training and certification

    Article • January 27th, 2009

  • Network Basics

    An introduction to IT Security for physical security experts

    Article • January 27th, 2009

  • Hitachi, SECUDE collaborate on notebook computer security solution

    Companies' collaboration to open new era in hard drive data protection

    Article • January 7th, 2009

  • Exelon to implement Guidance Software solution

    Company chooses EnCase eDisocovery to manage sensitive data

    Article • January 5th, 2009

  • Document Security

    Protecting sensitive information both inside and outside of the firewall

    Article • October 27th, 2008

  • Network Intrusion Detection

    Securing an organization’s digital assets and information at the perimeter

    Article • October 27th, 2008

  • Network Risk Management

    Protecting an organization’s digital assets should start with the system’s backbone

    Article • October 27th, 2008