News
Business applications
- 
				February 05, 2007
				
					05
					Feb'07
				
Coviello: In 3 years, no more stand-alone security
RSA President Art Coviello says today's patchwork of monolithic security devices will disappear in the next three years as security is integrated into the larger IT infrastructure.
 - 
				February 05, 2007
				
					05
					Feb'07
				
Gates touts secure access anywhere
Microsoft's chairman tells RSA Conference 2007 attendees that a combination of authentication and access management strategies is what it takes to protect corporate data, but information security pros are willing to wait for the proof.
 - 
				February 05, 2007
				
					05
					Feb'07
				
Does it cost extra for unified storage?
For a lot of NAS-based systems -- even Windows Storage Server (WSS) with an iSCSI target unified storage capability is probably...
 - 
				February 04, 2007
				
					04
					Feb'07
				
Vista exploitable, researcher says
Marc Maiffret, CTO and chief hacking officer of eEye Digital Security, said he has found a way to elevate system privileges by exploiting a flaw in Windows Vista.
 
- 
			February 04, 2007
			
				04
				Feb'07
			
CISOs mastering 'softer' skills
Why CISOs can no longer rely on technology skills alone and what businesses are looking for when recruiting their next information security leader.
 - 
			February 04, 2007
			
				04
				Feb'07
			
Email security buying decisions
Email security can be a daunting task for SMBs -- how do you go about finding the right product? This tip delves into three approaches to email security and the products available.
 - 
			February 04, 2007
			
				04
				Feb'07
			
Dozens of Web sites spread malicious Trojan
Update: The same malicious JavaScript keylogger that compromised the Dolphin Stadium Web site last week was found over the weekend on dozens of other high-profile Web sites.
 - 
			February 04, 2007
			
				04
				Feb'07
			
New zero-day attack targets Microsoft Excel
Microsoft says maliciously crafted Excel files may permit the execution of arbitrary code. Other Microsoft Office applications may be at risk.
 - 
			February 04, 2007
			
				04
				Feb'07
			
HDS to acquire Archivas for up to $120M
HDS will acquire archiving software partner, Archivas for close to $120 million stepping up its effort to compete with EMC in this market.
 - 
			February 04, 2007
			
				04
				Feb'07
			
HP fills in gaps with product updates
HP announced updates to several of its products, but analysts are wondering what its ultimate strategy will be for storage virtualisation.
 
- 
			February 04, 2007
			
				04
				Feb'07
			
Intrusion detection systems are alive and kicking
IPS hasn't overtaken intrusion detection systems just yet. Senior News Writer Bill Brenner reveals what customers want when they're shopping for IDS products.
 - 
			January 30, 2007
			
				30
				Jan'07
			
Symantec exploitation video hits YouTube
Symantec posted a clip on the popular video-sharing site showing researchers using a newly discovered flaw in Microsoft Word to drop an executable on a vulnerable machine.
 - 
			January 30, 2007
			
				30
				Jan'07
			
Windows Vista voice command tricked
An attacker found a way to play audio commands at a user's machine tricking the voice command capability in Vista into running arbitrary code.
 - 
			January 30, 2007
			
				30
				Jan'07
			
Microsoft disputes Word zero-day report
Symantec is warning of a new zero-day vulnerability in Microsoft Word. But Microsoft doesn't believe the flaw is new.
 - 
			January 30, 2007
			
				30
				Jan'07
			
Lawyers discuss e-discovery gotchas
During panel sessions at Legal Tech, lawyers provided their insights into the e-discovery process, retention policies and helping judges get up to speed.
 - 
			January 30, 2007
			
				30
				Jan'07
			
Symantec unveils 'universal ID system'
Symantec said the goal is to create a universally accepted identity system across all Web sites -- from online financial institutions to retailers -- for millions of consumers.
 - 
			January 30, 2007
			
				30
				Jan'07
			
Using IAM tools to improve compliance
Provisioning and password management tools can ease complexity, reduce help desk calls and save money. But they also have an added benefit: they can help with your compliance woes.
 - 
			January 29, 2007
			
				29
				Jan'07
			
Hybrid drives hit NAS boxes
DNF will be making hybrid drives available in all of its storage products, but it doesn't recommend them for IP SANs.
 - 
			January 29, 2007
			
				29
				Jan'07
			
Managed VoIP -- 10 tips for a smooth migration
Migrating to managed VoIP doesn't have to be a headache. Here, Verizon Business offers 10 top tips to ensure you get what you need.
 - 
			January 29, 2007
			
				29
				Jan'07
			
TJX faces lawsuit over data breach
A class action lawsuit against TJX accuses the retailer of negligence for not doing enough to secure customer data and for keeping quiet about the breach for a month.
 - 
			January 28, 2007
			
				28
				Jan'07
			
IBM improves data recovery process for TSM users
Tivoli Storage Manager 5.4, released this week, establishes a disk cache for most recently backed-up files, improving the slow restore times associated with the product.
 - 
			January 28, 2007
			
				28
				Jan'07
			
IBM to acquire Softek, looks to pump up services biz
IBM says it intends to use Softek's Transparent Data Migration Facility within its Global Services business.
 - 
			January 28, 2007
			
				28
				Jan'07
			
Brocade unveils McData integration roadmap
McData's directors and FICON routers will remain separate product lines for now; McData's SAN management software will replace Brocade's Fabric Manager.
 - 
			January 25, 2007
			
				25
				Jan'07
			
Balancing the cost and benefits of countermeasures
The final tip in our series, "How to assess and mitigate information security threats."
 - 
			January 25, 2007
			
				25
				Jan'07
			
Malware: The ever-evolving threat
The first tip in our series, "How to assess and mitigate information security threats"
 - 
			January 25, 2007
			
				25
				Jan'07
			
Network-based attacks
The second tip in our series, "How to assess and mitigate information security threats."
 - 
			January 25, 2007
			
				25
				Jan'07
			
Information theft and cryptographic attacks
The third tip in our series, "How to assess and mitigate information security threats."
 - 
			January 25, 2007
			
				25
				Jan'07
			
IBM tool makes online purchases anonymous
A new tool makes online purchases anonymous by using artificial identity information. Experts say enterprises need to adopt the technology before it can become a viable option.
 - 
			January 25, 2007
			
				25
				Jan'07
			
Symantec makes major update to Enterprise Vault
Symantec adds automated data classification and integration with security products in Version 7.0 of its Enterprise Vault archiving tool; EMC reports record earnings for the fourth quarter.
 - 
			January 25, 2007
			
				25
				Jan'07
			
Apple fixes Mac Wi-Fi flaw
The Mac OS X Wi-Fi flaw Apple fixed on 24 Jan was first disclosed as part of the Month of Kernel Bugs in November. Attackers could exploit it to crash the targeted system.
 - 
			January 24, 2007
			
				24
				Jan'07
			
iSCSI SANs grow in midmarket, enterprise
Because transporting "SCSI over IP" leverages ubiquitous Ethernet networks, that translates to lower cost, easier maintenance and simpler management, which makes SAN deployment more attractive for SMEs.
 - 
			January 24, 2007
			
				24
				Jan'07
			
Microsoft investigates new Word zero-day
An unpatched memory-corruption flaw in Microsoft Word is the target of "limited" attacks in the wild, Microsoft confirmed Thursday.
 - 
			January 24, 2007
			
				24
				Jan'07
			
TJX data breach info used to make fraudulent purchases
Fraudulent purchases have been reported globally, according to a trade association that represents more than 200 banks in Massachusetts.
 - 
			January 23, 2007
			
				23
				Jan'07
			
Cisco fixes IOS flaws
Attackers could exploit three Cisco IOS flaws to cause a denial of service or launch malicious code. The networking giant has released fixes.
 - 
			January 23, 2007
			
				23
				Jan'07
			
Veracode launches on-demand code analysis service
New start up Veracode gives customers the ability to analyse the application binary, and not simply the source code.
 - 
			January 23, 2007
			
				23
				Jan'07
			
McAfee: Malware all about ID theft
The use of keylogger technology is surging and there's been a 100-fold rise in phishing attacks, according to a new report from McAfee.
 - 
			January 17, 2007
			
				17
				Jan'07
			
Companies take IM threats seriously
Wesabe is a brand new money management community. It takes threats to IM as seriously as those targeting email and web applications
 - 
			January 16, 2007
			
				16
				Jan'07
			
Fortify Software to acquire Secure Software
The acquisition of Secure Software will allow Fortify to expand into the requirements and design phases of the software development lifecycle, the company said.
 - 
			January 15, 2007
			
				15
				Jan'07
			
Core Security offers powerful testing tool
We highly recommend Core Impact 6.0 to security engineers to verify the vulnerability of their networks.
 - 
			January 15, 2007
			
				15
				Jan'07
			
Apere's IMAG 500 a tough sell
Product review: Apere says many of the issues we encountered are addressed in its next release, but mid-enterprise businesses may not have the tolerance for this product.
 - 
			January 11, 2007
			
				11
				Jan'07
			
Oracle emulates Microsoft with advance patch notice
Oracle will patch 52 security flaws across its product line Tuesday, according to its inaugural CPU advance notification bulletin.
 - 
			January 10, 2007
			
				10
				Jan'07
			
Sophos acquires Endforce to add NAC
Antivirus vendor Sophos is rounding out its email Web and desktop security software with Endforce's network access control (NAC) software.
 - 
			January 09, 2007
			
				09
				Jan'07
			
Remote flaw in Vista could earn finder $8,000
VeriSign Inc.'s iDefense Labs is offering an $8,000 bounty to any researcher who finds a remotely exploitable flaw in Windows Vista.
 - 
			January 09, 2007
			
				09
				Jan'07
			
Network configuration management key to VoIP success
While companies spend millions on upgrading infrastructure for VoIP, little attention is given to solving the largest source of downtime – configuration-related outages due to human error.
 - 
			January 08, 2007
			
				08
				Jan'07
			
How far apart can SAN locations be?
Storage locations can potentially be very far apart, separated by thousands of miles, even around the globe. The real consideration in selecting distance is that of latency...
 - 
			January 08, 2007
			
				08
				Jan'07
			
What has been the impact of storage virtualization on SAN deployments?
I really have not seen storage virtualization driving storage area network (SAN) deployment...
 - 
			January 08, 2007
			
				08
				Jan'07
			
Critical fixes for Excel, Outlook and Windows
Microsoft starts the year with security updates for Excel, Outlook and Windows. Three of the fixes are rated critical.
 - 
			January 08, 2007
			
				08
				Jan'07
			
Convergence, interoperability key in disaster planning
Convergence and interoperability are major factors in ensuring communications continuity in a disaster.
 - 
			January 08, 2007
			
				08
				Jan'07
			
Attackers hide malicious code using new method
Attackers have designed a new way to thwart virus signatures from antivirus vendors, says a new report.
 - 
			January 08, 2007
			
				08
				Jan'07
			
What guidelines should our listeners use for oversubscribing or under subscribing?
Oversubscription has long been a contentious topic...
 
