IT/Networking Columns & Features Archive

  • WatchGuard acquires BorderWare Technologies

    Acquisition to allow company access to new markets, business environments and channel partners

    Article • August 4th, 2009

  • CCTV—Which Wire Should You Use?

    Coaxial cable: Coax is good for short wire runs in low-noise environments. Its thick copper construction yields low signal losses. As an unbalanced transmission-line, its interference immunity is poor compared to that of balanced twisted-pair cables and...

    Article • July 25th, 2009

  • At the Frontline: Cyber security expert Jim Butterworth

    Guidance Software’s director of cyber security shares his insights on recent attacks by hackers and what security professionals need to know to stop them

    Article • July 21st, 2009

  • Data Center Security

    Physical controls are a crucial part of creating a secure environment

    Article • June 30th, 2009

  • Telos accepted into (ISC)2 CPE submission program

    Members can immediately begin earning CPEs for Security Solutions 2009, other training events

    Article • May 13th, 2009

  • What’s Happening with the Switch to IP?

    Each spring, thousands of security professionals and vendors migrate to the Nevada desert for the annual ISC West security show held in Las Vegas. In recent years, video surveillance products have been among the most visible and numerous show-cased...

    Article • May 13th, 2009

  • Social Engineering

    The big risk no one’s thinking about

    Article • April 22nd, 2009

  • Patrick Townsend Security Solutions to exhibit at spring tradeshows

    Company to debut Alliance Key Manager solution at RSA Expo 2009

    Article • April 20th, 2009

  • IP 101 Tutorial – Multicasting

    DO YOU KNOW the difference between IP broadcast and multicast? When is it appropriate to use multicasting for network video transmission? This month’s column is a quick tutorial on the basic methods of IP data transmission: unicast, broadcast and...

    Article • March 10th, 2009

  • Exaprotect warns IT industry to secure virtual networks

    Recent examples of pirated Apple software exposes vulnerabilities of networks

    Article • January 28th, 2009

  • Know What to Keep

    Preserving Electronically Stored Information for Litigation and Investigations

    Article • January 27th, 2009

  • Wireless Security - Does it still matter?

    While many companies have addressed the issue, not everyone is secure

    Article • January 27th, 2009

  • H.264 – Does It Live Up to the Hype?

    The race to provide video surveillance products with H.264 compression has started.  Manufacturers are adopting this standard compression for digital video recorders, network cameras and video encoders with the promise to reduce video data by up to 50...

    Article • January 27th, 2009

  • Beware of the ‘NAT’

    Advances in video compression and the availability of high speed Internet have made remote video monitoring more practical and in high demand from end-users. The typical application for small business owners involves using a PC to access live and...

    Article • January 27th, 2009

  • Get Certified?

    The real deal with Information Security training and certification

    Article • January 27th, 2009