News
News Archive
-
January 25, 2007
25
Jan'07
Network-based attacks
The second tip in our series, "How to assess and mitigate information security threats."
-
January 25, 2007
25
Jan'07
Threats to physical security
Tip No. 6 in our series, "How to assess and mitigate information security threats."
-
January 25, 2007
25
Jan'07
Information theft and cryptographic attacks
The third tip in our series, "How to assess and mitigate information security threats."
-
January 25, 2007
25
Jan'07
IBM tool makes online purchases anonymous
A new tool makes online purchases anonymous by using artificial identity information. Experts say enterprises need to adopt the technology before it can become a viable option.
-
January 25, 2007
25
Jan'07
Symantec makes major update to Enterprise Vault
Symantec adds automated data classification and integration with security products in Version 7.0 of its Enterprise Vault archiving tool; EMC reports record earnings for the fourth quarter.
-
January 25, 2007
25
Jan'07
Apple fixes Mac Wi-Fi flaw
The Mac OS X Wi-Fi flaw Apple fixed on 24 Jan was first disclosed as part of the Month of Kernel Bugs in November. Attackers could exploit it to crash the targeted system.
-
January 24, 2007
24
Jan'07
iSCSI SANs grow in midmarket, enterprise
Because transporting "SCSI over IP" leverages ubiquitous Ethernet networks, that translates to lower cost, easier maintenance and simpler management, which makes SAN deployment more attractive for SMEs.
-
January 24, 2007
24
Jan'07
Microsoft investigates new Word zero-day
An unpatched memory-corruption flaw in Microsoft Word is the target of "limited" attacks in the wild, Microsoft confirmed Thursday.
-
January 24, 2007
24
Jan'07
TJX data breach info used to make fraudulent purchases
Fraudulent purchases have been reported globally, according to a trade association that represents more than 200 banks in Massachusetts.
-
January 24, 2007
24
Jan'07
Microsoft, Nortel introduce new unified communications apps
Microsoft and Nortel's Innovative Communications Alliance takes unified communications to the next level with its latest combined applications.
-
January 24, 2007
24
Jan'07
RSVP ready to manage VoIP, video traffic
Though its 10 year past was riddled with failures, RSVP is fast returning as one of the best tools for managing QoS for VoIP and video.
-
January 23, 2007
23
Jan'07
Cisco fixes IOS flaws
Attackers could exploit three Cisco IOS flaws to cause a denial of service or launch malicious code. The networking giant has released fixes.
-
January 23, 2007
23
Jan'07
Veracode launches on-demand code analysis service
New start up Veracode gives customers the ability to analyse the application binary, and not simply the source code.
-
January 23, 2007
23
Jan'07
McAfee: Malware all about ID theft
The use of keylogger technology is surging and there's been a 100-fold rise in phishing attacks, according to a new report from McAfee.
-
January 22, 2007
22
Jan'07
MP slams slow payment of tax credit IT compensation
The biggest compensation deal agreed between the government and a computer supplier - over tax credit IT problems - will, at the present rate of payment, take US company EDS more than 100 years to pay off in full.
-
January 22, 2007
22
Jan'07
EMC and Ibrix elbow out Panasas at Disney Studios
Disney needed a storage overhaul fast after merging with Pixar and making major changes to its upcoming new movie.
-
January 18, 2007
18
Jan'07
ID theft victim to TJX customers: Mind your data
Customers should guard their own data, says one ID theft victim. Meanwhile, some in the banking industry say TJX may have stored more data than necessary.
-
January 18, 2007
18
Jan'07
Can Caller ID on VoIP calls be customized?
Can I create the CID, name, area code and phone number that will display when I place a call via VoIP? Who do you like for VoIP service?
-
January 18, 2007
18
Jan'07
What considerations do I need to make when setting up a VoIP system to our remote office?
What considerations do I need to make when setting up a VoIP system to our remote office?
-
January 18, 2007
18
Jan'07
How can click-to-dial (click-to-call) be enabled at remote offices?
We've just installed Mitel 3300's across three sites and are looking to complete click-to-dial (click-to-call) for users utilizing Outlook 2003. The calls will then be pushed out via a 5340 handset. We can achieve this locally from our main site, ...
-
January 18, 2007
18
Jan'07
WAN/WAFS platform specifications
Product snapshots highlighting key specifications for a cross section of WAFS and WAN optimisation products intended for small, medium, and large organisations.
-
January 17, 2007
17
Jan'07
Data breach at TJX could affect millions
Retailer TJX Companies said a hacker gained access to its systems exposing the credit card data of millions of customers.
-
January 17, 2007
17
Jan'07
Companies take IM threats seriously
Wesabe is a brand new money management community. It takes threats to IM as seriously as those targeting email and web applications
-
January 17, 2007
17
Jan'07
Did TJX take the right steps after data breach?
Security experts are mixed on whether TJX acted properly following a massive data breach last month. One expert says potential victims should have been notified sooner.
-
January 17, 2007
17
Jan'07
Reasons why enterprise networking and security roles must stay separate
Enterprise network managers are responsible for configuring and managing network devices, but should they be accountable for tasks that are typically handled by the information security team? Contributor Shon Harris examines why networking and ...
-
January 17, 2007
17
Jan'07
VoIP security testing fundamentals
VoIP security testing fundamentals are discussed in this guide -- how to test a VoIP system, what tools to use, how to use fuzzing to test VoIP security.
-
January 16, 2007
16
Jan'07
Fortify Software to acquire Secure Software
The acquisition of Secure Software will allow Fortify to expand into the requirements and design phases of the software development lifecycle, the company said.
-
January 16, 2007
16
Jan'07
Routing: Five common, easily avoided errors
Router configuration errors don''t have to take down your network. Learn five common routing mistakes -- and how to avoid them -- in this tip.
-
January 16, 2007
16
Jan'07
Network security threats and answers, by industry
Michael Gregg offers network pros in various industries security advice and step-by-step solutions to help lock down the network.
-
January 15, 2007
15
Jan'07
Core Security offers powerful testing tool
We highly recommend Core Impact 6.0 to security engineers to verify the vulnerability of their networks.
-
January 15, 2007
15
Jan'07
Apere's IMAG 500 a tough sell
Product review: Apere says many of the issues we encountered are addressed in its next release, but mid-enterprise businesses may not have the tolerance for this product.
-
January 14, 2007
14
Jan'07
EMC, NetApp execs debate future of iSCSI
A discussion between an EMC and NetApp executive, via their blogs, has users and analysts debating: Will the "Year of iSCSI" ever really happen?
-
January 14, 2007
14
Jan'07
Storage management software finalists
Find out who was selected as finalists in the storage management software category for our storage products of the year
-
January 11, 2007
11
Jan'07
Oracle emulates Microsoft with advance patch notice
Oracle will patch 52 security flaws across its product line Tuesday, according to its inaugural CPU advance notification bulletin.
-
January 11, 2007
11
Jan'07
Network security -- Taking the layered approach
Network security is tricky business. In his new book Hack the Stack, author and security expert Michael Gregg outlines how to secure the network using the OSI model.
-
January 10, 2007
10
Jan'07
Out-of-cycle Microsoft patch likely, experts say
Patch specialists and IT administrators were surprised Microsoft didn't fix much-publicised Word zero-day flaws Tuesday. But they don't fault the company for holding back.
-
January 10, 2007
10
Jan'07
Sophos acquires Endforce to add NAC
Antivirus vendor Sophos is rounding out its email Web and desktop security software with Endforce's network access control (NAC) software.
-
January 10, 2007
10
Jan'07
Colonial Williamsburg virtualizes with Acopia
The living history museum is designed to show customers the 18th century, but behind the scenes, the business is implementing tiered storage using 21st-century file virtualization.
-
January 10, 2007
10
Jan'07
Critical Apple flaw discovered in Mac OS X
Attackers can exploit the flaw remotely to compromise a user's system via the Safari Web browser.
-
January 09, 2007
09
Jan'07
More users increase risk for Volkswagen AG
With 1.5 million users on the network, Volkswagen AG depends more than ever on strong ID and access management to safeguard intellectual property, according to its CISO.
-
January 09, 2007
09
Jan'07
Remote flaw in Vista could earn finder $8,000
VeriSign Inc.'s iDefense Labs is offering an $8,000 bounty to any researcher who finds a remotely exploitable flaw in Windows Vista.
-
January 09, 2007
09
Jan'07
Network configuration management key to VoIP success
While companies spend millions on upgrading infrastructure for VoIP, little attention is given to solving the largest source of downtime – configuration-related outages due to human error.
-
January 09, 2007
09
Jan'07
Network configuration management key to VoIP success
While companies spend millions on upgrading infrastructure for VoIP, little attention is given to solving the largest source of downtime – configuration-related outages due to human error. A well-defined change management process built around a ...
-
January 09, 2007
09
Jan'07
EMC restructures SMB storage division
EMC's Insignia group, originally a separate business unit, has seen layoffs and a restructuring, but EMC says it has no plans to discontinue its SMB products.
-
January 08, 2007
08
Jan'07
Is an SMB environment too small for a SAN?
Almost any size business can benefit from some type of SAN -- or "network storage"; whether it's NAS, iSCSI-based IP storage or FC storage...
-
January 08, 2007
08
Jan'07
What is the difference between virtualization switches and virtual SANs?
The word "virtualization" is thrown around so much that it's hard to always know what it means...
-
January 08, 2007
08
Jan'07
What is the difference between InfiniBand, SAS and iSCSI and where does each technology fit?
InfiniBand is an interface; just like Fibre Channel (FC) or Ethernet. As an interface, InfiniBand carries different protocols...
-
January 08, 2007
08
Jan'07
How far apart can SAN locations be?
Storage locations can potentially be very far apart, separated by thousands of miles, even around the globe. The real consideration in selecting distance is that of latency...
-
January 08, 2007
08
Jan'07
What is the difference between SAN routing, channel extension and virtualization?
Some folks see SAN routing as just segmentation; some see it as protocol conversion; some see it as distance enablement. SAN routing really embraces all those...
-
January 08, 2007
08
Jan'07
What has been the impact of storage virtualization on SAN deployments?
I really have not seen storage virtualization driving storage area network (SAN) deployment...