Features

Review: Positive Networks PhoneFactor

Review: Positive Networks PhoneFactor

PhoneFactor from Positive Networks does this and more. The combination of the product’s functionality, its ease of use and the company’s business model make this a highly innovative multifactor authentication solution.
Peter Stephenson, May 27 2008 3:49PM Security
Fast ways to cut costs

Fast ways to cut costs

A recessionary funk is in the air, and if experience is any guide, IT, and consequently IT security, will be one of the first places CFOs and CEOs will look to slash budgets.
Amrit Williams, chief technical officer, BigFix, Inc. May 27 2008 6:52AM Security
Guest Column: Implementing the right CRM system

Guest Column: Implementing the right CRM system

Building and maintaining strong, solid relationships with customers is essential to the success of any business. According to Adam Sarner, an analyst with Gartner who focuses on the customer relationship management (CRM) industry, obtaining a new customer is 10 times more expensive than retaining an existing one.
James Simpson May 26 2008 3:09PM Software
Let's get physical

Let's get physical

There's a lot of talk about convergence between physical and information security, shame it hasn't happened.
Tim Mather May 26 2008 10:31AM Security
Copyright confusion

Copyright confusion

The laws on illegal downloading are due for a much-needed update, so make sure your voice is heard.
Nick Barron May 23 2008 4:12PM Security
Cyber security author discusses economics of protecting cyberspace

Cyber security author discusses economics of protecting cyberspace

U.S. economists have launched a book that claims to document the first systematic analysis of the economics of protecting cyberspace.
Liz Tay May 23 2008 2:35PM Security
Review: LogLogic LX 2010 v4.2

Review: LogLogic LX 2010 v4.2

LogLogic's LX 2010 provides customers with a good feature set for network forensic investigations.
Peter Stephenson, May 23 2008 2:31PM Security
Is Senator Conroy’s broadband network a 'dog of a process'?

Is Senator Conroy’s broadband network a 'dog of a process'?

The Liberal party believes Senator Stephen Conroy’s decision to extend the acceptance of proposals for the construction of a National Broadband Network is a ‘slight renovation’ and independent telecommunications analyst firm, Ovum, said it wasn’t surprising.
Lilia Guan May 23 2008 9:34AM Telco/ISP
How exposed are you?

How exposed are you?

Social networking sites are a security minefield, so we have created some exercises to test for vulnerabilities.
Ken Munro May 22 2008 3:26PM Security
Review: STRSRCH and URL_SRCH

Review: STRSRCH and URL_SRCH

STRSRCH and URL_SRCH are command-line utilities that can search text files for IP addresses, email addresses, URLs and strings. The biggest advantage of these offerings is the speed at which they can process large amounts of data.
Justin Peltier May 22 2008 3:19PM Security
EV SSL and XSS: Mixing apples and oranges

EV SSL and XSS: Mixing apples and oranges

When individuals lack an understanding of the specifics of a technology, it is very easy to make inaccurate conclusions on how any two technologies are related -- if they are related at all
Tim Callan, vice president, SSL product marketing, Ver May 21 2008 11:28AM Security
Review: Technology Pathways ProDiscover Incident Response

Review: Technology Pathways ProDiscover Incident Response

ProDiscover Forensic 4.9 is a solution that is best used to analyse an entire system. It includes utilities for viewing the registry, event log and internet activity from a captured image.
Peter Stephenson, May 21 2008 11:21AM Security
Australia’s IT banking revolution is here

Australia’s IT banking revolution is here

The antiquated systems of our banks are in need of an IT makeover and the pressure is starting to come to a head for the majors.
Mitchell Bingemann May 21 2008 11:12AM Hardware
The return of the vista

The return of the vista

Eventually you do get bored with cursing your ISP and eventually it’s time to talk to someone in the tech support department to try and find out what’s really going on with your link.
Ian Yates May 20 2008 3:04PM Telco/ISP
Review: Helix 1.9

Review: Helix 1.9

We are fans of open-source software and Helix 1.9 falls into this category. Helix has two components, each with its own set of utilities. The first component is the Windows element, which can be started on a booted Windows system by simply inserting the CD into the drive.
Justin Peltier May 20 2008 1:36PM Security
Review: Forensic Toolkit v2.0

Review: Forensic Toolkit v2.0

Forensic Toolkit (FTK) is one of the most full-featured sets of products. It includes a forensic imager utility, a registry viewer facility and the Distributed Network Attack, which aids password recovery with the password recovery toolkit.
Justin Peltier May 19 2008 3:01PM Security
Software: Safe by design

Software: Safe by design

A new industry alliance promises to pave the way for more secure software. Is SAFECode what we've been waiting for?
Mark Mayne May 16 2008 3:47PM Security
Review: DParaben Device Seizure

Review: DParaben Device Seizure

Paraben has established itself as the market leader in hand-held forensics because its software is easy to use and covers a wide range of devices including PDAs, smartphones, and mobile phones.
Justin Peltier May 16 2008 3:44PM Security
Review: Niksun NetDetector

Review: Niksun NetDetector

Niksun's NetDetector goes way beyond simple network-based forensics. This appliance features not only the ability to do forensics and incident analysis, it also has an intrusion detection system and can do complete network security surveillance.
Peter Stephenson, May 15 2008 2:16PM Security
Interview: Shlomo Kramer, CEO of Imperva

Interview: Shlomo Kramer, CEO of Imperva

The serial company founder and SC's CEO of the Year tells Paul Fisher why he knew all along that data-centric security was the future.
Paul Fisher May 15 2008 11:52AM Security

Log In

  |  Forgot your password?