Quantcast
Channel: Computerworld - Stories by David Strom RSS feed
Browsing all 15 articles
Browse latest View live

Smartphones take center stage in two-factor authentication schemes

We all know that relying on a simple user ID and password combination is fraught with peril. One alternative is to use one of the single sign-on solutions we reviewed last year, but there are less...

View Article



What to look for when evaluating password manager software

Here are the significant issues that can distinguish one password manager product from another. You'll probably make a similar list of requirements as you do your own research for password managers.

View Article

Best tools for protecting passwords

For enterprises trying to get a handle on password management, the good news is that there are products that can help implement stronger password policies for end users logging into corporate and...

View Article

Remembering Quark and AppleTalk, Netware and Gopher

The Apple Mac has played an important part of my professional journalism career for at least 20 of the years that I have been a writer. One Mac or another has been my main writing machine since 1990,...

View Article

In Pictures: How to protect virtual machines (VMs)

These four products represent different approaches to VM security

View Article


Unisys unveils invisibility cloak for network traffic

If you are ultra paranoid, what could be better than hiding your network traffic in such a way that no one could possibly intercept it? This is what Unisys is offering with its new Stealth appliance,...

View Article

Working together: 3 new team collaboration tools

Three new services -- Flow, Glip and Slingshot -- try to enhance the ability of teams to converse and collaborate using a variety of tools.

View Article

Peak vs. Tibbr: Two apps that help track team communications

Peak and Tibbr are two tools that teams can use to help track projects and improve workgroup communications.

View Article


Uptime simplifies system and server monitoring

Server and systems management tools have long been too expensive and too complex to actually use without spending thousands of dollars on consultants. Uptime Software has been trying to change that...

View Article


Why Israel could be the next cybersecurity world power

There are plenty of cities in the U.S. that want to lay claim to becoming the "next" Silicon Valley, but a dusty desert town in the south of Israel called Beersheva might actually have a shot at...

View Article

Email encryption has gotten so much better, so you'd be crazy not to use it

I once co-wrote a book on enterprise email where I likened email encryption to a "sucking chest wound." That was in 1997, when you had to do all the encryption key management on your own, a daunting...

View Article

9-vendor authentication roundup: The good, the bad and the ugly

New ‘smart’ tokens and risk-based factors deliver tighter security, but setups remain complex and user interfaces need a facelift.

View Article

What is application security? A process and tools for securing software

Application security is the process of making apps more secure by finding, fixing, and enhancing the security of apps. Checking for security flaws in your applications is essential as threats become...

View Article


10 Slack security tools compared

Slack does a good job of protecting its own code, but you'll need help to stop malware delivered through Slack messages or to avoid exposing personal information.

View Article

Best tools for single sign-on (SSO)

SSO can reduce the risk of weak passwords and administrative overhead associated with managing account access. These are the top single sign-on solutions to consider.

View Article

Browsing all 15 articles
Browse latest View live




Latest Images