Brian Prince

Novell Expands Identity Management with Compliance Platform

Novell is looking to take on its rivals in the identity and security management space with a new platform of prepackaged products and integration resources designed to help organizations monitor compliance. The company’s approach can be conceived of as a play against its rivals in the identity management and user provisioning markets, including Sun Microsystems, […]

Continuent Tungsten Stack Targets MySQL Database Replication

Continuent wants to plug what it sees as a hole in the market when it comes to MySQL replication. Continuent has a long history with MySQL, going back to when Continuent was called Emic Networks and was focused on providing high-availability clustering for the open-source database. Now, Continuent has expanded its open-source stack to include […]

IBM Information On Demand Strategy Takes New Twist

After years of talking up Information On Demand, on Sept. 2 a new phrase came out of IBM’s collective lips-“Information Agenda.” But far from being a change in direction, the latest announcement is about helping businesses better manage and gain deeper insight into data. The initiative shows the maturity of IBM’s Information On Demand strategy, […]

Google Chrome Security Features May Not Impress Web Surfers

Google has outfitted its Chrome browser with a number of security features designed to help Chrome make a splash in a market still dominated by Microsoft Internet Explorer. But whether or not the features are enough to differentiate Google’s browser remains to be seen. For the most part, Google Chrome follows the footsteps of other […]

SenSage Focuses on Event Data to Make Mark in Data Warehouse Space

In the crowded space that is data warehousing, SenSage is trying to carve out its own niche by leveraging its history in security information management for what it calls the event data warehouse. To hear SenSage tell it, the event data warehouse aims to help enterprises deal with voluminous amounts of event data such as […]

NASA Worm Talk Underscores Spread of Online Gaming Threats

A laptop and an affinity for online gaming-that may have been all it took to introduce a cyber-security threat to a space station. Though NASA spokesperson Kelly Humphries remained unwilling Aug. 29 to officially confirm the nature of the worm detected on laptops at the International Space Station, spaceref.com, which broke the story, and other […]

Accused British Hacker Gary McKinnon Loses Appeal to Block Extradition

A British man accused by the United States of “the biggest military hack of all time” lost an appeal on Thursday and could be extradited to the United States within weeks. Gary McKinnon, 42, had asked the European Court of Human Rights to block his extradition, complaining that he could face inhumane prison conditions if […]

Internet Explorer 8 Beta 2 Privacy Features Win User Support

Much has been made of the new security features in Microsoft Internet Explorer 8 Beta 2. As users and testers bang on the beta version of the browser, Microsoft appears to have gotten a lot right when it comes to privacy. In the Beta 2 version of Internet Explorer 8, Microsoft has added a number […]

WhiteHat Report Finds Web Site Security Vulnerabilities Persist

WhiteHat Security’s latest report on Web site vulnerabilities has found the Internet in slightly better shape-emphasis on slightly. In the fifth installment of the “WhiteHat Website Security Statistics Report,” the company has found that 82 percent of the 687 Web sites assessed by the company have had at least one security issue since WhiteHat began […]

Apple iPhone Password Bypass Made Public

The passcode feature on the latest version of Apple’s iPhone can be bypassed, potentially allowing an unauthorized person to access data on the device if it is lost or stolen. The issue was posted to a MacRumors.com discussion forum and affects iPhone 2.02. Users can lock the iPhone with a four-digit passcode to limit access […]