Articles
Malware as we know it today is evolving and will evolve even more going forward, says Karel Rode, consultant at Performanta.
The complexity of IAM software requires planning to ensure benefits filter through the entire business, says Karel Rode, principal consultant, CA.
Identity management is fraught with confusing terms and misunderstanding.
System administrators need to treat virtual environments with the same care they do any other systems.
Data has to be dealt with appropriately, because it is governed by trust.
Biometric user authentication can be a cost-effective value proposition.
Today's smart cards rely on hi-tech, and aim to make our lives easier and safer.
Electronic spam is as unappealing as its ham-in-a-can version, and just as difficult to process.
Although authoritarian environments can make people unhappy, rules are important if anarchy is to be prevented.
What is the difference between identity management, identity and access management, and a user directory?
Effective content management should be a concern no matter the size of the enterprise.
Many South African corporates have taken a reactive rather proactive approach to security, exacerbating the problems associated with being online, says Karel Rode, business technologist at CA.