Features

Review: Clearwell Intelligence Platform v 2.0

Review: Clearwell Intelligence Platform v 2.0

It’s a litigious world. Today there are organisations that believe that one gets ahead by litigation, not innovation. More important and, perhaps, more common, are regulatory requirements that mandate a detailed response to investigative inquiries.
Peter Stephenson, May 30 2008 2:32PM Security
Exclusive - Windows 7 details revealed

Exclusive - Windows 7 details revealed

We’ve managed to score an exclusive interview with one of the lead programmers on Windows 7. Here’s what you can expect to find in the new version, direct from our inside source, who of course, wishes to remain anonymous.
Ian Yates May 30 2008 9:58AM Software
Review: Network Critical CriticalConneX and CriticalTAP systems

Review: Network Critical CriticalConneX and CriticalTAP systems

In the SC Labs, we have numerous requirements for tapping — in most cases, for monitoring activity on a test bed. Monitoring is the primary use for tapping, and the alternative is using a span port.
Peter Stephenson, May 29 2008 3:27PM Security
Secrets stolen? No, just the intellectual property

Secrets stolen? No, just the intellectual property

World Intellectual Property Day (April 26 of each year) came and went; pundits and politicians all made their statements, countries and their counsels all presented their positions, international organizations implored their members to protect intellectual property and the creativity and innovation represented.
Christopher Burgess, co-author, "Secrets Stolen, Fortunes Lost May 29 2008 10:45AM Security
Isolating contractors from sensitive data

Isolating contractors from sensitive data

For information security directors at large corporations, the growing reliance on contractors is a major concern. Local and offshore programmers provide businesses a competitive edge, but they also increase security risks.
Ryan Malone, vice president of marketing, Apani May 28 2008 8:12AM Security
Review: BeyondTrust Privilege Manager v3.5

Review: BeyondTrust Privilege Manager v3.5

In Unix it is important that there be multiple levels of administrator rights, and managing that with group permissions is pretty awkward. I recall wondering why there was not such a utility for Windows since, arguably, Windows has the same challenges with administrator rights in spades.
Peter Stephenson, May 27 2008 3:51PM Security
Review: Positive Networks PhoneFactor

Review: Positive Networks PhoneFactor

PhoneFactor from Positive Networks does this and more. The combination of the product’s functionality, its ease of use and the company’s business model make this a highly innovative multifactor authentication solution.
Peter Stephenson, May 27 2008 3:49PM Security
Fast ways to cut costs

Fast ways to cut costs

A recessionary funk is in the air, and if experience is any guide, IT, and consequently IT security, will be one of the first places CFOs and CEOs will look to slash budgets.
Amrit Williams, chief technical officer, BigFix, Inc. May 27 2008 6:52AM Security
Guest Column: Implementing the right CRM system

Guest Column: Implementing the right CRM system

Building and maintaining strong, solid relationships with customers is essential to the success of any business. According to Adam Sarner, an analyst with Gartner who focuses on the customer relationship management (CRM) industry, obtaining a new customer is 10 times more expensive than retaining an existing one.
James Simpson May 26 2008 3:09PM Software
Let's get physical

Let's get physical

There's a lot of talk about convergence between physical and information security, shame it hasn't happened.
Tim Mather May 26 2008 10:31AM Security
Copyright confusion

Copyright confusion

The laws on illegal downloading are due for a much-needed update, so make sure your voice is heard.
Nick Barron May 23 2008 4:12PM Security
Cyber security author discusses economics of protecting cyberspace

Cyber security author discusses economics of protecting cyberspace

U.S. economists have launched a book that claims to document the first systematic analysis of the economics of protecting cyberspace.
Liz Tay May 23 2008 2:35PM Security
Review: LogLogic LX 2010 v4.2

Review: LogLogic LX 2010 v4.2

LogLogic's LX 2010 provides customers with a good feature set for network forensic investigations.
Peter Stephenson, May 23 2008 2:31PM Security
Is Senator Conroy’s broadband network a 'dog of a process'?

Is Senator Conroy’s broadband network a 'dog of a process'?

The Liberal party believes Senator Stephen Conroy’s decision to extend the acceptance of proposals for the construction of a National Broadband Network is a ‘slight renovation’ and independent telecommunications analyst firm, Ovum, said it wasn’t surprising.
Lilia Guan May 23 2008 9:34AM Telco/ISP
How exposed are you?

How exposed are you?

Social networking sites are a security minefield, so we have created some exercises to test for vulnerabilities.
Ken Munro May 22 2008 3:26PM Security
Review: STRSRCH and URL_SRCH

Review: STRSRCH and URL_SRCH

STRSRCH and URL_SRCH are command-line utilities that can search text files for IP addresses, email addresses, URLs and strings. The biggest advantage of these offerings is the speed at which they can process large amounts of data.
Justin Peltier May 22 2008 3:19PM Security
EV SSL and XSS: Mixing apples and oranges

EV SSL and XSS: Mixing apples and oranges

When individuals lack an understanding of the specifics of a technology, it is very easy to make inaccurate conclusions on how any two technologies are related -- if they are related at all
Tim Callan, vice president, SSL product marketing, Ver May 21 2008 11:28AM Security
Review: Technology Pathways ProDiscover Incident Response

Review: Technology Pathways ProDiscover Incident Response

ProDiscover Forensic 4.9 is a solution that is best used to analyse an entire system. It includes utilities for viewing the registry, event log and internet activity from a captured image.
Peter Stephenson, May 21 2008 11:21AM Security
Australia’s IT banking revolution is here

Australia’s IT banking revolution is here

The antiquated systems of our banks are in need of an IT makeover and the pressure is starting to come to a head for the majors.
Mitchell Bingemann May 21 2008 11:12AM Hardware
The return of the vista

The return of the vista

Eventually you do get bored with cursing your ISP and eventually it’s time to talk to someone in the tech support department to try and find out what’s really going on with your link.
Ian Yates May 20 2008 3:04PM Telco/ISP

Log In

  |  Forgot your password?