Stories by David Strom

  • Why Israel could be the next cybersecurity world power

    By David Strom | 11 March, 2015 07:24

    There are plenty of cities in the U.S. that want to lay claim to becoming the "next" Silicon Valley, but a dusty desert town in the south of Israel called Beersheva might actually have a shot at becoming something more modest, and more focused. They want to be the first place you think about when it comes to cybersecurity research, education, and innovation. If things go right there, it may well happen.

  • Uptime simplifies system and server monitoring

    By David Strom | 13 January, 2015 07:42

    Server and systems management tools have long been too expensive and too complex to actually use without spending thousands of dollars on consultants. Uptime Software has been trying to change that with a product that can be installed and useful within an hour. We tested the latest version (7.3.1) on a small network of Windows physical and virtual machines.

  • Peak vs. Tibbr: Two apps that help track team communications

    By David Strom | 14 August, 2014 20:45

    Peak and Tibbr are two tools that teams can use to help track projects and improve workgroup communications.

  • Working together: 3 new team collaboration tools

    By David Strom | 23 July, 2014 20:36

    Three new services -- Flow, Glip and Slingshot -- try to enhance the ability of teams to converse and collaborate using a variety of tools.

  • Unisys unveils invisibility cloak for network traffic

    By David Strom | 05 May, 2014 20:38

    If you are ultra paranoid, what could be better than hiding your network traffic in such a way that no one could possibly intercept it? This is what Unisys is offering with its new Stealth appliance, which could make man-in-the-middle attacks and keylogger exploits obsolete, or at least more difficult to mount.

  • In Pictures: How to protect virtual machines (VMs)

    By David Strom | 11 March, 2014 08:27

    These four products represent different approaches to VM security

  • Remembering Quark and AppleTalk, Netware and Gopher

    By David Strom | 21 January, 2014 13:11

    The Apple Mac has played an important part of my professional journalism career for at least 20 of the years that I have been a writer. One Mac or another has been my main writing machine since 1990, and has been in daily use, traveling around the world several times and my more-or-less constant work companion. It is a tool not a religion, yet I have been quite fond of the various machines that I have used.

  • In Pictures: Best tools for protecting passwords

    By David Strom | 09 September, 2013 08:16

    Passwords are a security weak link, but these products help shield passwords from attackers

  • Best tools for protecting passwords

    By David Strom | 03 September, 2013 10:23

    For enterprises trying to get a handle on password management, the good news is that there are products that can help implement stronger password policies for end users logging into corporate and personal Web-based services, as well as for employees who share a local server login.

  • What to look for when evaluating password manager software

    By David Strom | 03 September, 2013 06:04

    Here are the significant issues that can distinguish one password manager product from another. You'll probably make a similar list of requirements as you do your own research for password managers.

  • In Pictures: Threat management tools for small businesses

    By David Strom | 25 July, 2013 08:31

    Check Point wins test of eight unified threat management (UTM) devices for small business.

  • Smartphones take center stage in two-factor authentication schemes

    By David Strom | 20 May, 2013 14:30

    We all know that relying on a simple user ID and password combination is fraught with peril. One alternative is to use one of the single sign-on solutions we reviewed last year, but there are less expensive options that could also be easier to install.

  • In Pictures: Best tools for social media analytics

    By David Strom | 26 March, 2013 08:41

    How to tell if your Facebook, Twitter and LinkedIn efforts are paying off

  • How to tell if your Twitter, Facebook and LinkedIn efforts are paying off

    By David Strom | 25 March, 2013 13:51

    As businesses make more use of social networks, the number of engagement, analysis and monitoring tools has exploded. Enterprises are trying to understand their return on social media investments, to find out if their Twitter and Facebook marketing campaigns are actually delivering customers. They want to track social mentions across multiple networks and be responsive to both kudos and complaints.

  • Single sign-on moves to the cloud

    By David Strom | 17 December, 2012 15:23

    We are awash in passwords, and as the number of Web services increases, things are only going to get worse. Trying to manage all these individual passwords is a major problem for enterprise security. Many end users cope by re-using their passwords, which exposes all sorts of security holes.

 

Latest News

02:15PM
Aussie appetite for fast broadband proves to be insatiable
02:07PM
Dicker Data partners NEXTDC to provide "affordable" Cloud solutions
01:27PM
There should be a ‘when, not if’ approach to security issues in the channel: Log...
01:22PM
Huawei's Australian enterprise business posts triple digit revenue growth
More News
21 Apr
APJ Progress Spark Conference
22 Apr
2015 Innotribe Startup Challenge
27 Apr
Disruptocon
27 Apr
Disruptocon
View all events