News

News Archive

  • May 11, 2007 11 May'07

    Choosing WAN providers: Key questions to ask

    When evaluating carrier services for the WAN, it's imperative to ask some key questions regarding customer service, service-level agreements, global coverage, management and monitoring capabilities, and underlying technologies. Make sure these ...

  • May 11, 2007 11 May'07

    Cisco fixes fresh flaws in IOS

    Attackers could exploit two flaws in Cisco's IOS to cause a denial of service or tamper with data in a device file system.

  • May 11, 2007 11 May'07

    VoIP, unified communications adoption continue to rise

    VoIP and unified communications adoption continue to rise steadily in the enterprise, according to Infonetics Research's latest report.

  • May 10, 2007 10 May'07

    EMC buys Indigo Stone for bare-metal restore

    EMC has been hush-hush about adding Indigo Stone, a bare-metal restore software company, to its stack of acquisitions.

  • May 09, 2007 09 May'07

    Symantec fixes flaws in Norton, pcAnywhere

    Attackers could exploit flaws in Symantec's Norton AntiVirus and pcAnywhere to launch malicious code or compromise a user's session credentials.

  • May 08, 2007 08 May'07

    Companies plug FTP holes with secure FTP servers

    Some companies are investing in secure FTP suites to give employees and business partners the ability to transfer large files such as large documents, audio, video and photos.

  • May 08, 2007 08 May'07

    What top five subjects does the CCNA test focus on?

    Know what subjects are tested most heavily on in the CCNA exam. Use this top five list from Cisco certifications expert Dave Minutella in this response.

  • May 08, 2007 08 May'07

    ISCSI TCP/IP TOE card specifications

    One means of improving iSCSI traffic performance is to include TOE (TCI/IP Offload Engine) capability on the Ethernet card itself. An iSCSI TOE allows the network adapter to process iSCSI traffic (often all Ethernet LAN traffic) locally -- relieving...

  • May 07, 2007 07 May'07

    Is RAID in general an obsolete technology today?

    This is a technology that is so commonly used, so transparent, that we really don't even think about it...

  • May 07, 2007 07 May'07

    What are the most important new disk drive technologies?

    The first 1 terabyte hard disk drives have appeared. What will be the impact of hard disk drive technologies such as perpendicular recording, 2.5-inch high-performance drives, secure erase, encryption and hybrid technology drives?

  • May 06, 2007 06 May'07

    Intransa launches 10 GigE IP SAN

    Intransa is now shipping a standalone 10 GigE system, but it may take a while for applications and operating systems to be ready for the big pipe.

  • May 03, 2007 03 May'07

    Quiz: Preventing data leaks

    A six-question multiple-choice quiz to test your understanding of the content presented by expert Richard Bejtlich in this lesson of SearchSecurity.com's Data Protection Security School.

  • May 03, 2007 03 May'07

    Quiz: Enterprise strategies for protecting data at rest

    A five-question multiple-choice quiz to test your understanding of the e-discovery content presented by expert Perry Carpenter in this lesson of SearchSecurity.com's Data Protection Security School.

  • May 03, 2007 03 May'07

    Quiz: Demystifying data encryption

    A five-question multiple-choice quiz to test your understanding of the data encryption content presented by expert Tom Bowers in this lesson of SearchSecurity.com's Data Protection Security School.

  • May 03, 2007 03 May'07

    Network waste to reach $100 billion

    Network overspending will cost enterprises more than $100 billion over the next five years, according to recent predictions by Gartner Inc.

  • May 03, 2007 03 May'07

    Microsoft users sticking with third-party security vendors

    IT pros are pleased with Microsoft's security advances, including those found in Forefront. But don't expect them to drop their third-party security vendors.

  • May 02, 2007 02 May'07

    Microsoft to release DNS patch Tuesday

    In addition to a fix for the DNS Server Service flaw, Microsoft plans to patch critical flaws in Windows, Office, Exchange, CAPICOM and BizTalk.

  • May 01, 2007 01 May'07

    IM slang glossary

  • April 29, 2007 29 Apr'07

    WEP: Wireless security's broken skeleton in the closet

    WEP for wireless security was cracked again recently. Though many will say WEP is obsolete, many companies still use it.

  • April 26, 2007 26 Apr'07

    New image spam sneaks into inboxes

    Researchers at Secure Computing Corp. have discovered a new form of image spam that is sneaking into corporate systems and clogging inboxes.

  • April 26, 2007 26 Apr'07

    Websense to acquire SurfControl

    Websense says its planned $400 million acquisition of SurfControl will allow it to better compete in the global security market.

  • April 25, 2007 25 Apr'07

    NetApp VP says storage virtualization overrated

    NetApp's vice president of emerging products, Jay Kidd, discusses storage virtualization, competition with Isilon and NetApp's current identity crisis.

  • April 24, 2007 24 Apr'07

    Scaling storage networks demands careful consideration

    In the Fibre Channel world, scaling often means adding more and faster switch ports to extend the fabric's bandwidth and connectivity. But IP storage (mainly iSCSI) is a growing area of SAN expansion, using ubiquitous Ethernet network technology to ...

  • April 24, 2007 24 Apr'07

    Apple fixes 25 Mac OS X flaws

    Attackers could exploit about two dozen flaws in Mac OS X to cause a denial of service, bypass security restrictions, disclose sensitive data and run malicious code.

  • April 24, 2007 24 Apr'07

    Hitachi launches 1 TB SATA disk drive

    Hitachi has taken the wraps off three new products: a 1 TB enterprise SATA disk drive, a 2.5-inch SAS drive and a 300 GB multi-interface drive.

  • April 23, 2007 23 Apr'07

    Weekly compilation of storage news:Dell LTO-4 drive, new Sun array

    Dell is first out of the gate with the new LTO-4 drive, which offers native encryption; Sun unveils new array and deepens its relationship with FalconStor.

  • April 20, 2007 20 Apr'07

    Disaster Recovery Planning Podcasts

    DR expert Jon Toigo explains how the new realities of business make DR planning an essential element of daily IT process, procedure, product development and procurement.

  • April 20, 2007 20 Apr'07

    Convergence certification provides evaluation standard

    CompTIA has developed a convergence certification, designed to validate qualified convergence professionals.

  • April 18, 2007 18 Apr'07

    How do I calculate the time taken for a file to be transferred over a WAN link?

    Calculate the time it will take for a file to transfer over a WAN link with the help of Dr. Hughes in this expert response.

  • April 18, 2007 18 Apr'07

    Convergence certification provides evaluation standard

    Voice and data convergence are more prevalent and enterprises are looking for certified professionals to administer the combined networks -- leading CompTIA to develop its Convergence+ certification, designed to validate qualified convergence ...

  • April 17, 2007 17 Apr'07

    SNW: Users wary of outsourcing backup

    Symantec unveiled plans for outsourced, online data backup services this week, but users at Storage Networking World are more cautious than ever about letting go of their data.

  • April 17, 2007 17 Apr'07

    Storage consolidation: Disks and disk subsystems overview

    Any storage consolidation effort must involve a serious consideration of disk subsystems and the specific disk types that those systems will contain

  • April 16, 2007 16 Apr'07

    Storage consolidation: Weighing the pros and cons

    Storage consolidation holds out the promise of more efficient storage management. But pitfalls include slower network performance and a difficult data migration process.

  • April 16, 2007 16 Apr'07

    EMC, Symantec to enter Software as a Service market

    EMC has plans to release Software as a Service (SaaS) products for data backup and archiving; Symantec announces a new online backup service.

  • April 16, 2007 16 Apr'07

    DNS worm strikes at Microsoft flaw

    A new worm called Rinbot.BC exploits the Microsoft DNS flaw by installing an IRC bot on infected machines and scanning for other vulnerable servers.

  • April 16, 2007 16 Apr'07

    How is SIP winning favor over H.323?

    What are the similarities, differences and major reasons between SIP and H.323. And why is one winning?

  • April 16, 2007 16 Apr'07

    How does file archiving differ from email and database archiving or document management systems?

    The thing they all have in common is "archiving" -- long-term storage and preservation of data that's inactive...

  • April 15, 2007 15 Apr'07

    Malware outbreak 'largest in almost a year'

    Security firm Postini and the SANS Internet Storm Center said they are tracking a significant malware outbreak. Postini calls it the biggest email attack in almost a year.

  • April 12, 2007 12 Apr'07

    Microsoft investigates DNS server flaw

    Attackers could exploit a DNS flaw in Microsoft Windows 2000 Server and Windows Server 2003 and run malicious code on the system. A workaround is suggested until a patch is issued.

  • April 12, 2007 12 Apr'07

    Microsoft DNS server flaw called dangerous

    UPDATE: Microsoft said Sunday that attacks are still limited, but a proof of concept code to exploit the vulnerability is publicly available.

  • April 11, 2007 11 Apr'07

    Instant messaging threats become more sophisticated

    Instant messaging faces greater threats as more enterprises begin to utilize it, making it a more appealing target to hackers.

  • April 11, 2007 11 Apr'07

    Architectural firm swaps online data backup service providers

    As online data backup services take off, one early adopter slashed costs dramatically by switching to a newer service on the market.

  • April 10, 2007 10 Apr'07

    Capacity planning software specifications

    Gauging storage needs over time is one of the biggest challenges faced by IT administrators, and a new generation of capacity planning tools is emerging to help forecast growth and utilisation of storage resources.

  • April 10, 2007 10 Apr'07

    Emulex stands alone with FC-SATA switch

    Emulex has released an embedded storage switch based on the newly approved FC-SATA standard, but it's unclear if any other companies in the industry are on the bandwagon.

  • April 10, 2007 10 Apr'07

    The changing threat of email attacks

    In this Messaging Security School lesson, expert Mike Rothman details the state of next-generation email threats, explores reputation systems and uncovers threats AV can't catch.

  • April 10, 2007 10 Apr'07

    Capacity planning software specifications

    Gauging storage needs over time is one of the biggest challenges faced by IT administrators, and a new generation of capacity planning tools is emerging to help forecast growth and utilization of storage resources, and even perform predictive ...

  • April 10, 2007 10 Apr'07

    Capacity planning tools require serious purchase consideration

    Capacity costs money, and new disk acquisitions stand out as a notable part of every IT budget. The trick is to match new capacity with actual storage needs. Gauging storage needs over time is one of the biggest challenges faced by IT administrators...

  • April 09, 2007 09 Apr'07

    HP renews SMB storage campaign

    With the launch of the new All-in-One 1200 and the shifting of executives to a new SMB business unit, HP is focused on its low-end products in an effort to boost growth.

  • April 08, 2007 08 Apr'07

    How data deduplication eases storage requirements

    Storage administrators are struggling to handle spiraling volumes of documents, audio, video, images and large email attachments. Adding storage is not always the best solution, and many companies are turning to data reduction technologies such as ...

  • April 08, 2007 08 Apr'07

    Spam campaign uses Storm-like attack technique

    Spammers used an attack technique much like last January's "Storm" assault to dupe people into downloading malware over the weekend. This time, they used fake WWIII headlines.