News

Enterprise software

  • June 06, 2007 06 Jun'07

    Zero-day flaws affect Firefox, IE

    A researcher published details on four new zero-day flaws affecting Firefox and Internet Explorer. They could be exploited to log keystrokes, download malware and steal cookies.

  • June 05, 2007 05 Jun'07

    IBM to acquire Watchfire for risk, compliance

    IBM agreed to acquire Waltham, Mass.-based Watchfire Corp. to add Web application and compliance testing tools into Big Blue's Rational development platform.

  • June 05, 2007 05 Jun'07

    Watchfire will help IBM build application security

    Analysts have been pushing the Security 3.0 concept this week at Gartner's IT Security Summit, and one analyst says IBM's acquisition of Watchfire illustrates the trend.

  • June 03, 2007 03 Jun'07

    IBM: We're No. 1 in storage hardware

    A new combined disk and tape tracker from IDC has IBM trumpeting from the rooftops that it's the market leader. But what's IBM's story when it comes to software?

  • May 31, 2007 31 May'07

    HDS CEO quits for HP storage biz

    Dave Roberson, CEO of Hitachi Data Systems since 2006, has jumped ship to HP to run the server giant's storage business.

  • May 30, 2007 30 May'07

    Brocade gets into the HBA business

    Experts say the move, based on a partnership with LSI, could lower HBA pricing across the board and be the first step toward a Brocade-developed storage virtualization product.

  • May 29, 2007 29 May'07

    SAN School: Table of contents

    What is a storage area network? What are the benefits and pitfalls of installation? How can a SAN fit into your organization? These questions and more are answered SAN School.

  • May 25, 2007 25 May'07

    VoIP advice from the trenches

    ITKE, or ITKnowledge Exchange, is simply a cool (and quick) way to get a response to your VoIP-related questions.

  • May 24, 2007 24 May'07

    Microsoft fixes Office 2007 patch issues, releases MOICE

    The Microsoft Security Response Center acknowledged that some of the company's May 8 security updates didn't make it to machines running Office 2007 on Windows Vista.

  • May 24, 2007 24 May'07

    Symantec, Huawei form joint storage, security company

    Symantec has formed a joint venture with storage and networking hardware company Huawei and indicated jointly developed products are coming to the US

  • May 24, 2007 24 May'07

    IETF approves new weapon to fight spam, phish

    DomainKeys Identified Mail specification (DKIM) gained approval as an official IETF standard. The approval is seen as a major step in the fight against spam and phishing attacks.

  • May 24, 2007 24 May'07

    Microsoft investigates new Office zero-day flaw

    Attackers could exploit a newly-discovered zero-day flaw in Office 2000 to run malicious code on targeted machines, Symantec warned.

  • May 21, 2007 21 May'07

    EMC users push for better power consumption

    EMC announces a 1.8 PB VTL, deduplication for VMware and bare-metal restore for servers as users caution the company to stay focused on everyday problems, such as power consumption.

  • May 21, 2007 21 May'07

    Mobile instant messaging enhances company's business processes

    A mobile IM service acquired by a hosted VoIP provider encourages more companies to enhance their business processes.

  • May 17, 2007 17 May'07

    VoIP security fundamentals

    VoIP security is a challenge for IT staff because IP telephony brings with it not only the security problems of data networks but also new threats specific to VoIP. In this fundamentals guide, learn about network security threats and emerging IP ...

  • May 16, 2007 16 May'07

    When signature based antivirus isn't enough

    Zero-day exploits, targeted attacks and increasing demands for endpoint application controls are driving the rapid metamorphosis from signature-based antivirus and antispyware to HIPS-based integrated products.

  • May 11, 2007 11 May'07

    Cisco fixes fresh flaws in IOS

    Attackers could exploit two flaws in Cisco's IOS to cause a denial of service or tamper with data in a device file system.

  • May 10, 2007 10 May'07

    EMC buys Indigo Stone for bare-metal restore

    EMC has been hush-hush about adding Indigo Stone, a bare-metal restore software company, to its stack of acquisitions.

  • May 09, 2007 09 May'07

    Symantec fixes flaws in Norton, pcAnywhere

    Attackers could exploit flaws in Symantec's Norton AntiVirus and pcAnywhere to launch malicious code or compromise a user's session credentials.

  • May 08, 2007 08 May'07

    Companies plug FTP holes with secure FTP servers

    Some companies are investing in secure FTP suites to give employees and business partners the ability to transfer large files such as large documents, audio, video and photos.

  • May 07, 2007 07 May'07

    Is RAID in general an obsolete technology today?

    This is a technology that is so commonly used, so transparent, that we really don't even think about it...

  • May 03, 2007 03 May'07

    Quiz: Enterprise strategies for protecting data at rest

    A five-question multiple-choice quiz to test your understanding of the e-discovery content presented by expert Perry Carpenter in this lesson of SearchSecurity.com's Data Protection Security School.

  • May 03, 2007 03 May'07

    Quiz: Demystifying data encryption

    A five-question multiple-choice quiz to test your understanding of the data encryption content presented by expert Tom Bowers in this lesson of SearchSecurity.com's Data Protection Security School.

  • May 03, 2007 03 May'07

    Microsoft users sticking with third-party security vendors

    IT pros are pleased with Microsoft's security advances, including those found in Forefront. But don't expect them to drop their third-party security vendors.

  • May 02, 2007 02 May'07

    Microsoft to release DNS patch Tuesday

    In addition to a fix for the DNS Server Service flaw, Microsoft plans to patch critical flaws in Windows, Office, Exchange, CAPICOM and BizTalk.

  • April 26, 2007 26 Apr'07

    New image spam sneaks into inboxes

    Researchers at Secure Computing Corp. have discovered a new form of image spam that is sneaking into corporate systems and clogging inboxes.

  • April 25, 2007 25 Apr'07

    NetApp VP says storage virtualization overrated

    NetApp's vice president of emerging products, Jay Kidd, discusses storage virtualization, competition with Isilon and NetApp's current identity crisis.

  • April 24, 2007 24 Apr'07

    Scaling storage networks demands careful consideration

    In the Fibre Channel world, scaling often means adding more and faster switch ports to extend the fabric's bandwidth and connectivity. But IP storage (mainly iSCSI) is a growing area of SAN expansion, using ubiquitous Ethernet network technology to ...

  • April 24, 2007 24 Apr'07

    Apple fixes 25 Mac OS X flaws

    Attackers could exploit about two dozen flaws in Mac OS X to cause a denial of service, bypass security restrictions, disclose sensitive data and run malicious code.

  • April 23, 2007 23 Apr'07

    Weekly compilation of storage news:Dell LTO-4 drive, new Sun array

    Dell is first out of the gate with the new LTO-4 drive, which offers native encryption; Sun unveils new array and deepens its relationship with FalconStor.

  • April 17, 2007 17 Apr'07

    Storage consolidation: Disks and disk subsystems overview

    Any storage consolidation effort must involve a serious consideration of disk subsystems and the specific disk types that those systems will contain

  • April 16, 2007 16 Apr'07

    Storage consolidation: Weighing the pros and cons

    Storage consolidation holds out the promise of more efficient storage management. But pitfalls include slower network performance and a difficult data migration process.

  • April 16, 2007 16 Apr'07

    EMC, Symantec to enter Software as a Service market

    EMC has plans to release Software as a Service (SaaS) products for data backup and archiving; Symantec announces a new online backup service.

  • April 16, 2007 16 Apr'07

    How does file archiving differ from email and database archiving or document management systems?

    The thing they all have in common is "archiving" -- long-term storage and preservation of data that's inactive...

  • April 15, 2007 15 Apr'07

    Malware outbreak 'largest in almost a year'

    Security firm Postini and the SANS Internet Storm Center said they are tracking a significant malware outbreak. Postini calls it the biggest email attack in almost a year.

  • April 12, 2007 12 Apr'07

    Microsoft investigates DNS server flaw

    Attackers could exploit a DNS flaw in Microsoft Windows 2000 Server and Windows Server 2003 and run malicious code on the system. A workaround is suggested until a patch is issued.

  • April 12, 2007 12 Apr'07

    Microsoft DNS server flaw called dangerous

    UPDATE: Microsoft said Sunday that attacks are still limited, but a proof of concept code to exploit the vulnerability is publicly available.

  • April 11, 2007 11 Apr'07

    Instant messaging threats become more sophisticated

    Instant messaging faces greater threats as more enterprises begin to utilize it, making it a more appealing target to hackers.

  • April 11, 2007 11 Apr'07

    Architectural firm swaps online data backup service providers

    As online data backup services take off, one early adopter slashed costs dramatically by switching to a newer service on the market.

  • April 10, 2007 10 Apr'07

    Capacity planning software specifications

    Gauging storage needs over time is one of the biggest challenges faced by IT administrators, and a new generation of capacity planning tools is emerging to help forecast growth and utilisation of storage resources.

  • April 08, 2007 08 Apr'07

    How data deduplication eases storage requirements

    Storage administrators are struggling to handle spiraling volumes of documents, audio, video, images and large email attachments. Adding storage is not always the best solution, and many companies are turning to data reduction technologies such as ...

  • April 08, 2007 08 Apr'07

    Spam campaign uses Storm-like attack technique

    Spammers used an attack technique much like last January's "Storm" assault to dupe people into downloading malware over the weekend. This time, they used fake WWIII headlines.

  • April 08, 2007 08 Apr'07

    Symantec fixes 'high-risk' flaw in Enterprise Security Manager

    Attackers could hijack machines from remote locations by exploiting a flaw in Symantec Enterprise Security Manager (ESM). Kaspersky Lab users also have a flaw to deal with.

  • April 04, 2007 04 Apr'07

    Data security breach at UCSF may have exposed thousands

    The University of California at San Francisco (UCSF) acknowledged Wednesday that a security hole in a computer server may have exposed 46,000 people to potential identity fraud.