News
Enterprise software
-
May 08, 2007
08
May'07
Companies plug FTP holes with secure FTP servers
Some companies are investing in secure FTP suites to give employees and business partners the ability to transfer large files such as large documents, audio, video and photos.
-
May 07, 2007
07
May'07
Is RAID in general an obsolete technology today?
This is a technology that is so commonly used, so transparent, that we really don't even think about it...
-
May 03, 2007
03
May'07
Quiz: Enterprise strategies for protecting data at rest
A five-question multiple-choice quiz to test your understanding of the e-discovery content presented by expert Perry Carpenter in this lesson of SearchSecurity.com's Data Protection Security School.
-
May 03, 2007
03
May'07
Quiz: Demystifying data encryption
A five-question multiple-choice quiz to test your understanding of the data encryption content presented by expert Tom Bowers in this lesson of SearchSecurity.com's Data Protection Security School.
-
May 03, 2007
03
May'07
Microsoft users sticking with third-party security vendors
IT pros are pleased with Microsoft's security advances, including those found in Forefront. But don't expect them to drop their third-party security vendors.
-
May 02, 2007
02
May'07
Microsoft to release DNS patch Tuesday
In addition to a fix for the DNS Server Service flaw, Microsoft plans to patch critical flaws in Windows, Office, Exchange, CAPICOM and BizTalk.
-
April 26, 2007
26
Apr'07
New image spam sneaks into inboxes
Researchers at Secure Computing Corp. have discovered a new form of image spam that is sneaking into corporate systems and clogging inboxes.
-
April 25, 2007
25
Apr'07
NetApp VP says storage virtualization overrated
NetApp's vice president of emerging products, Jay Kidd, discusses storage virtualization, competition with Isilon and NetApp's current identity crisis.
-
April 24, 2007
24
Apr'07
Scaling storage networks demands careful consideration
In the Fibre Channel world, scaling often means adding more and faster switch ports to extend the fabric's bandwidth and connectivity. But IP storage (mainly iSCSI) is a growing area of SAN expansion, using ubiquitous Ethernet network technology to ...
-
April 24, 2007
24
Apr'07
Apple fixes 25 Mac OS X flaws
Attackers could exploit about two dozen flaws in Mac OS X to cause a denial of service, bypass security restrictions, disclose sensitive data and run malicious code.
-
April 23, 2007
23
Apr'07
Weekly compilation of storage news:Dell LTO-4 drive, new Sun array
Dell is first out of the gate with the new LTO-4 drive, which offers native encryption; Sun unveils new array and deepens its relationship with FalconStor.
-
April 17, 2007
17
Apr'07
Storage consolidation: Disks and disk subsystems overview
Any storage consolidation effort must involve a serious consideration of disk subsystems and the specific disk types that those systems will contain
-
April 16, 2007
16
Apr'07
Storage consolidation: Weighing the pros and cons
Storage consolidation holds out the promise of more efficient storage management. But pitfalls include slower network performance and a difficult data migration process.
-
April 16, 2007
16
Apr'07
EMC, Symantec to enter Software as a Service market
EMC has plans to release Software as a Service (SaaS) products for data backup and archiving; Symantec announces a new online backup service.
-
April 16, 2007
16
Apr'07
How does file archiving differ from email and database archiving or document management systems?
The thing they all have in common is "archiving" -- long-term storage and preservation of data that's inactive...
-
April 15, 2007
15
Apr'07
Malware outbreak 'largest in almost a year'
Security firm Postini and the SANS Internet Storm Center said they are tracking a significant malware outbreak. Postini calls it the biggest email attack in almost a year.
-
April 12, 2007
12
Apr'07
Microsoft investigates DNS server flaw
Attackers could exploit a DNS flaw in Microsoft Windows 2000 Server and Windows Server 2003 and run malicious code on the system. A workaround is suggested until a patch is issued.
-
April 12, 2007
12
Apr'07
Microsoft DNS server flaw called dangerous
UPDATE: Microsoft said Sunday that attacks are still limited, but a proof of concept code to exploit the vulnerability is publicly available.
-
April 11, 2007
11
Apr'07
Instant messaging threats become more sophisticated
Instant messaging faces greater threats as more enterprises begin to utilize it, making it a more appealing target to hackers.
-
April 11, 2007
11
Apr'07
Architectural firm swaps online data backup service providers
As online data backup services take off, one early adopter slashed costs dramatically by switching to a newer service on the market.
-
April 10, 2007
10
Apr'07
Capacity planning software specifications
Gauging storage needs over time is one of the biggest challenges faced by IT administrators, and a new generation of capacity planning tools is emerging to help forecast growth and utilisation of storage resources.
-
April 08, 2007
08
Apr'07
How data deduplication eases storage requirements
Storage administrators are struggling to handle spiraling volumes of documents, audio, video, images and large email attachments. Adding storage is not always the best solution, and many companies are turning to data reduction technologies such as ...
-
April 08, 2007
08
Apr'07
Spam campaign uses Storm-like attack technique
Spammers used an attack technique much like last January's "Storm" assault to dupe people into downloading malware over the weekend. This time, they used fake WWIII headlines.
-
April 08, 2007
08
Apr'07
Symantec fixes 'high-risk' flaw in Enterprise Security Manager
Attackers could hijack machines from remote locations by exploiting a flaw in Symantec Enterprise Security Manager (ESM). Kaspersky Lab users also have a flaw to deal with.
-
April 04, 2007
04
Apr'07
Data security breach at UCSF may have exposed thousands
The University of California at San Francisco (UCSF) acknowledged Wednesday that a security hole in a computer server may have exposed 46,000 people to potential identity fraud.
-
April 01, 2007
01
Apr'07
Spam poses as Internet Explorer 7 download
Beware of emails from "[email protected]." It may look like an invitation to download Internet Explorer 7, but it's really a trick to infect machines with malware.
-
April 01, 2007
01
Apr'07
Microsoft releases patch for Windows ANI flaw
Security companies are seeing massive attacks against the Windows ANI zero-day flaw, prompting Microsoft to rush out a fix a week before Patch Tuesday.
-
March 27, 2007
27
Mar'07
Compellent adds boot from SAN consolidation
Update saves storage space by consolidating boot volumes into a "golden" copy of the OS, but experts are troubled by a lack of partnerships with server and OS vendors.
-
March 27, 2007
27
Mar'07
Storage newcomers fight uphill battle
Gresham is newly marketing its VTL product to mixed U.S. reviews, and Australian file management player Moonwalk is inching its way onto U.S. radar screens.
-
March 26, 2007
26
Mar'07
What are some of the other options available to help manage unstructured data?
Eliminate unnecessary data from your production storage. This typically involves moving the unnecessary data to a different tier or deleting the data entirely...
-
March 26, 2007
26
Mar'07
What are some of the best practices for managing the growth of unstructured data?
It starts with corporate policies around data management...
-
March 26, 2007
26
Mar'07
What is unstructured data and how is it different from structured data in the enterprise?
What we're really doing is designating our data as structured or unstructured. Let's start with structured data...
-
March 26, 2007
26
Mar'07
Web 2.0: CIOs want it their way
A new study found CIOs want Web 2.0 technology, but they're a little insecure about getting it from emerging specialized vendors.
-
March 26, 2007
26
Mar'07
Metasploit Framework 3.0 released
Brief: Metasploit Framework 3.0 contains 177 exploits, 104 payloads, 17 encoders and 30 auxiliary modules that perform such tasks as host discovery and protocol fuzzing.
-
March 26, 2007
26
Mar'07
Should I use data deduplication to manage unstructured data?
Absolutely; there are two areas where data deduplication, or single-instance storage, can help...
-
March 26, 2007
26
Mar'07
What are some of the biggest challenges with unstructured data?
By far, the volume of data has to be the biggest challenge...
-
March 26, 2007
26
Mar'07
IP communications tools boost productivity, sales
IP communications tools have opened up several possibilities for one North American company, giving it presence awareness and unified messaging.
-
March 25, 2007
25
Mar'07
Microsoft investigates Windows Vista Mail flaw
Attackers could exploit a flaw in Windows Vista Mail to compromise PCs by tricking the user into opening a malicious email attachment. Microsoft is investigating.
-
March 25, 2007
25
Mar'07
EMC CEO tips hat on future storage plans
At a media event in Sydney, EMC CEO, Joe Tucci said the company is working on storage tuned to the needs of Web 2.0 apps and also plugged the company's deduplication product.
-
March 22, 2007
22
Mar'07
Midrange storage array purchase considerations
A Buying Guide focusing on specific considerations for midrange disk array systems. Also find a series of specifications to help make on-the-spot product comparisons between v
-
March 22, 2007
22
Mar'07
Flaws haunt protocol tied to national infrastructure
Also: A weakness is found in Windows settings, Microsoft investigates a new Vista flaw, and flaws are addressed in OpenOffice.org and Firefox.
-
March 22, 2007
22
Mar'07
Mozilla releases Firefox fix
One newly-discovered flaw and several glitches introduced in the last update have been fixed with Mozilla's release of Firefox 2.0.0.3 and 1.5.0.11.
-
March 22, 2007
22
Mar'07
Midrange storage array specifications
Product snapshots highlighting key specifications for a cross section of midrange storage array products.
-
March 21, 2007
21
Mar'07
Hackers broaden reach of cross-site scripting attacks
An explosion of AJAX-based applications has increased the damage that cross-site scripting (XSS) attacks can inflict on machines. A new tool uses XSS flaws to create a botnet.
-
March 21, 2007
21
Mar'07
VoiceCon Spring: A transition show for the VoIP industry
VoiceCon Spring was all about unified communications. Zeus Kerravala provides highlights of the more interesting points from the show.
-
March 20, 2007
20
Mar'07
NAC panel says technology may not add up
A panel discussing the potential of using network access control (NAC) says the technology may not be worth the price of deploying and maintaining it.
-
March 20, 2007
20
Mar'07
Symantec says fixing licensing portal top priority
Company officials say help is on the way as fallout continues from the merger of Symantec and Veritas ordering systems last November.
-
March 19, 2007
19
Mar'07
Internet complexity, insecurity could stifle innovation, expert says
Security threats are driving vendors to produce software and devices that automatically update and run only proprietary software with no effort from the end user. The result could be less flexibility and innovation, one expert says.
-
March 18, 2007
18
Mar'07
Symantec: Data thieves thrive on zero-day flaws
According to Symantec's threat report for the second half of 2006, attackers exploited misplaced USB drives and zero-day flaws to steal vast amounts of data. Expect more of the same in 2007.
-
March 18, 2007
18
Mar'07
Hacker techniques use Google to unearth sensitive data
Those who know where to look could use Google to dig up all sorts of sensitive company information, including intellectual property and passwords, one security expert warns.