News

IT strategy

  • November 28, 2006 28 Nov'06

    Adware targets Mac OS X

    As F-Secure notes what may be the first example of adware designed for Macs, researcher LMH reports more flaws in the operating system as part of the Month of Kernel Bugs.

  • November 22, 2006 22 Nov'06

    Zango defying FTC agreement, researchers say

    This week in Security Blog Log: Two researchers accuse Zango of unsavory adware tactics, despite the company's pledge to clean up its act.

  • November 21, 2006 21 Nov'06

    New Mac OS X flaw exposed

    A Mac OS X flaw was exposed as part of the Month of Kernel Bugs. Also, a new Web site vows to follow the lead of researchers LMH and H.D. Moore with a week of Oracle zero-days.

  • November 21, 2006 21 Nov'06

    BakBone brushes up replication software

    BakBone's NetVault Replicator version 5.0 includes automatic configuration of replication for remote sites, a capacity planning tool and a higher performance data movement engine.

  • November 08, 2006 08 Nov'06

    Storage virtualization acquisitions need careful consideration

    Storage virtualization alleviates traditional storage growth problems by implementing a layer of abstraction between applications and physical storage, allowing storage to be combined and treated as a ubiquitous resource, regardless of location. ...

  • November 07, 2006 07 Nov'06

    Big pay for storage jobs, page 6

    Find out what other storage professionals are being paid in this year's salary survey.

  • November 07, 2006 07 Nov'06

    Big pay for storage jobs, page 3

    Find out what other storage professionals are being paid in this year's salary survey.

  • November 07, 2006 07 Nov'06

    Big pay for storage jobs, page 7

    Find out what other storage professionals are being paid in this year's salary survey.

  • November 07, 2006 07 Nov'06

    Big pay for storage jobs

    Find out what other storage professionals are being paid in this year's salary survey.

  • November 07, 2006 07 Nov'06

    Big pay for storage jobs, page 4

    Find out what other storage professionals are being paid in this year's salary survey.

  • November 07, 2006 07 Nov'06

    Big pay for storage jobs, page 5

    Find out what other storage professionals are being paid in this year's salary survey.

  • November 07, 2006 07 Nov'06

    Mozilla fixes Firefox flaws

    Attackers could exploit multiple flaws in Firefox, SeaMonkey and Thunderbird to crash machines, bypass security restrictions and launch malicious code.

  • November 07, 2006 07 Nov'06

    Big pay for storage jobs, page 2

    Find out what other storage professionals are being paid in this year's salary survey.

  • November 06, 2006 06 Nov'06

    How to manage encryption keys

    Encryption is an effective way to secure data, but the encryption keys used must be carefully managed to ensure data remains protected and accessible when needed.

  • October 31, 2006 31 Oct'06

    Flaw found in Firefox 2.0

    Attackers could exploit the security flaw to crash versions 1.5.0.7 and 2.0 of the browser, according to various security advisories.

  • October 31, 2006 31 Oct'06

    E-vaulting's many faces can confuse IT efforts

    E-vaulting is the process that describes how enterprise IT departments ship backup tapes and replicate data to remote disk arrays and VTLs. E-vaulting is not a new concept, but more recently it has grown to mean remote backups and replication for ...

  • October 30, 2006 30 Oct'06

    Messaging Security School

    SearchSecurity.com's Messaging Security School has brought together some of the most knowledgeable experts in the messaging security field to offer you personal instruction on how to secure the information handled by your organization's knowledge ...

  • October 26, 2006 26 Oct'06

    Achieving compliance: a real-world roadmap

    A security manager's responsibilities extend beyond the technical aspects of the job. These days, effective governance and compliance are just as essential.

  • October 26, 2006 26 Oct'06

    Security Blog Log: The never-ending PatchGuard debate

    This week, security vendor fright over the Windows Vista PatchGuard feature permeates the blogosphere. Is Microsoft the boogeyman, or just misunderstood?

  • October 23, 2006 23 Oct'06

    What storage managers are buying and why, page 3

    What storage managers are buying and why

  • October 23, 2006 23 Oct'06

    What storage managers are buying and why, page 2

  • October 23, 2006 23 Oct'06

    What storage managers are buying and why, page 6

    What storage managers are buying and why

  • October 23, 2006 23 Oct'06

    IT executives eager to exploit Web 2.0 wave

    What good is a blog if no one reads it? IT managers find out and begin to make blogging and other Web 2.0 tools a more strategic part of their business.

  • October 22, 2006 22 Oct'06

    Enhanced Identity and Access Management

    From consolidating directories to automating provisioning and rolling out single sign-on, these sessions identify how leading organizations are strengthening authorization and enforcing access controls.

  • October 22, 2006 22 Oct'06

    Snyder On Security: An insider's guide to the essentials

    Joel Snyder, senior partner with consultancy Opus One, provides an in-depth look at information security trends and technologies.

  • October 18, 2006 18 Oct'06

    Rural Payments Agency project failed after IT system costs spiralled

    Delays in implementing a bespoke IT system led to the Rural Payments Agency (RPA) failing to pay subsidies to farmers on time, according to a National Audit Office report.

  • October 16, 2006 16 Oct'06

    Ray Noorda, the pioneer behind rise of Novell, dies

    Network computing pioneer and former Novell chief executive Ray Noorda has died aged 82.

  • October 09, 2006 09 Oct'06

    Banking on the future

    As the banking landscape changes and global competition takes hold, IT offers banks a way of differentiating themselves from the competition, so how do they balance innovation and imitation in this tough market sector?

  • October 04, 2006 04 Oct'06

    Tiered storage becoming tried and true

    Tiered storage matches the value of data with the performance (and expense) of storage. Ideally, tiered storage can save money, while easing the access demands to any single storage tier. While tiered storage has clearly brought storage costs and ...

  • October 03, 2006 03 Oct'06

    Alliance and Leicester to overhaul core systems

    Alliance & Leicester has announced plans replace many of its core banking systems with Accenture’s Alnova Financial Solutions banking platform under a three-year IT-led business transformation programme.

  • September 28, 2006 28 Sep'06

    Top tech tips from SearchStorage.com

    Check out the top tips on backup, SAN, NAS and storage management from SearchStorage.com.

  • September 26, 2006 26 Sep'06

    Stration worm targets Windows machines

    The worm uses several fake email messages, including one claiming to be a security update. Users are advised to avoid unsolicited email attachments.

  • September 24, 2006 24 Sep'06

    Hijacked consumer machines target the enterprise

    Attackers continue to strike gold by targeting consumers who lack the security savvy to address desktop application flaws, according to Symantec Corp. Enterprises ultimately pay the price.

  • September 14, 2006 14 Sep'06

    Secure network perimeter to result from Symantec-Juniper deal

    Juniper and Symantec announced a deal to integrate Symantec's client security software with Juniper's security hardware. The result will allow endpoint compliance and access control platforms to secure the enterprise perimeter.

  • September 14, 2006 14 Sep'06

    Three ways to create clustered storage, page 3

    Clustered storage systems run on storage servers, NAS gateways and hosts. Here's how to determine which clustered file-system architecture is best for your needs and storage environment.

  • September 14, 2006 14 Sep'06

    Three ways to create clustered storage

    Clustered storage systems run on storage servers, NAS gateways and hosts. Here's how to determine which clustered file-system architecture is best for your needs and storage environment.

  • September 12, 2006 12 Sep'06

    Dell and EMC: Five more years

    Dell leans on EMC for support in the face of an SEC investigation and possible delisting from NASDAQ.

  • September 12, 2006 12 Sep'06

    Big security fixes for QuickTime, Flash Player

    Apple and Adobe warned that attackers could exploit multiple flaws in QuickTime and Flash Player to run malicious code on targeted machines.

  • September 11, 2006 11 Sep'06

    VoIP still a confusing area for SMBs

    A study released at today's VON conference in Boston suggests that SMBs -- despite their growing use of VoIP -- are still confused about VoIP technology.

  • September 11, 2006 11 Sep'06

    Data storage compliance's impact on storage product choices

    Data storage compliance is having a tremendous impact on the storage organization, as well as the management practices employed to retain, search, certify and destroy data. It's not just regulations like SOX or HIPAA that influence storage -- there ...

  • September 11, 2006 11 Sep'06

    Security Bytes: Hackers target the Terminator

    In other news, Symantec upgrades its Norton product line and the Anti-Phishing Working Group says phishing activity soared this summer.

  • September 06, 2006 06 Sep'06

    Fast Guide: VoIP encryption

    A guide to encryption within VoIP networks

  • September 06, 2006 06 Sep'06

    VoIP startup untethers would-be mobile workers from wireline office phones

    VoIP startup DiVitas Networks has voice-over-WiFi-to-cellular technology in the works that gives endusers access to enterprise apps and puts dual-mode handset management in the hands of network administrators.

  • September 06, 2006 06 Sep'06

    Security Bytes: New flaw in Cisco IOS

    Security news including Cisco, Mozilla hires a former Microsoft strategist to bolster security, a new "pump-and-dump" stock spam campaign is discovered and TippingPoint lists info on new flaws.

  • September 05, 2006 05 Sep'06

    ControlGuard targets rogue devices

    ControlGuard Access Manager is an effective tool for controlling what devices users can add to their workstations and how they are used.

  • September 05, 2006 05 Sep'06

    Proofpoint delivers strong messaging security

    Proofpoint Messaging Security Gateway is a highly recommended, affordable solution for big enterprises that need protection from email-based attacks.

  • September 05, 2006 05 Sep'06

    VoIP outsourcing: Save money and gain flexibility

    VoIP outsourcing is the way to go for organisations looking to deploy voice services quickly and flexibly without a major investment in skills and upkeep.

  • September 04, 2006 04 Sep'06

    Revamped Cisco WAFS worth the wait, users say

    Months late, Cisco has finally released a combined Wan optimisation and WAFS product, while startups like Riverbed have been snapping up the customers. But some Cisco beta testers say it has been worth the wait.

  • August 31, 2006 31 Aug'06

    Attacks against MS06-040 on the rise

    Six pieces of malware are now going after the Windows Server Service flaw outlined in MS06-040, and a spike in attacks has led Symantec to raise its ThreatCon to Level 2.

  • August 31, 2006 31 Aug'06

    Emulex acquisition could cloud future of FC-SATA spec

    New Emulex subsidiary Sierra Logic's strength is in FC-SATA bridging technology. Meanwhile, ONStor launches midrange clustered NAS, and Quantum shareholders withhold votes.