Articles By BrianOHiggins

Submissions for copyright law revision, un-intended consequences, and IT security

Submissions for copyright law revision, un-intended consequences, and IT security

The Federal Government has just concluded its public consultation phaseregarding input for updating legislation for the copyright act.ITsecurity does not...

September 16th, 2009 BrianOHiggins
By way of example. . .

By way of example. . .

The HIPS tool the PAL team used provides an open interface so a custom rule to precisely shield the SipXtapi...

November 2nd, 2006 BrianOHiggins
Putting a PAL to work

Putting a PAL to work

Voice over IP - VoIP - is inevitable in government. It is the hottest area, and many government departments are...

November 1st, 2006 BrianOHiggins
Putting a PAL to work

Putting a PAL to work

The software vulnerability life cycle starts with a newly discovered or published vulnerability and ends when machines are patched. In...

November 1st, 2006 BrianOHiggins
By way of example…

By way of example…

The HIPS tool the PAL team used provides an open interface so a custom rule to precisely shield the SipXtapi...

October 29th, 2006 BrianOHiggins
Putting a PAL to work

Putting a PAL to work

Voice over IP – VoIP – is inevitable in government. It is the hottest area, and many government departments are...

October 29th, 2006 BrianOHiggins
The VoIP tradeoff

The VoIP tradeoff

IP telephony, better known as Voice over IP, or VoIP, is one of the most important emerging trends in telecom...

September 8th, 2005 BrianOHiggins
Apps under attack

Apps under attack

Security is just like quality – you’re never finished, because there’s always room for improvement.Compounding the problem is the fact...

May 4th, 2005 BrianOHiggins