News

News Archive

  • January 04, 2007 04 Jan'07

    Adobe Reader users urged to upgrade

    Adobe Reader 8 fixes serious flaws attackers could exploit for cross-site scripting and other attacks.

  • January 03, 2007 03 Jan'07

    Cisco bolsters security with IronPort buy

    Cisco Systems agreed Thursday to buy Internet gateway security vendor IronPort Systems Inc. for $830 million.

  • January 03, 2007 03 Jan'07

    Cisco software vulnerable to attack

    Cisco's Clean Access software and Clean Access Manager are at risk to attack. A malicious user can access a database snapshot and download it without authentication.

  • January 03, 2007 03 Jan'07

    Asterisk releases new software appliance

    Asterisk, the open source PBX, yesterday released a new software appliance that it says can be implemented in 30 minutes or less.

  • January 03, 2007 03 Jan'07

    Information security market 2006 year in review

    In part two of our two-part special edition of Security Wire Weekly, site editor Eric Parizo reveals his picks for top information security interviews of 2006. Audio clips in this program include Andrew Braunberg of Current Analysis; Johannes ...

  • January 02, 2007 02 Jan'07

    Security pros grumble over spam increase

    Spim and spam from unexpected sources is challenging enterprises in 2007. Some enterprises are taking action.

  • January 02, 2007 02 Jan'07

    Storage Outlook '07: In search of better data management

    Brian Peterson, storage architect for a Midwest-based Fortune 100 company, says better data management and business processes will be the main goal in 2007.

  • December 26, 2006 26 Dec'06

    Looking back at information security in 2006

    In this special edition of Security Wire Weekly, senior news writer Bill Brenner reviews his top interviews of 2006.

  • December 25, 2006 25 Dec'06

    Top 10 storage stories of 2006

    SAN and NAS converged and shook up the industry, iSCSI went mission-critical, users conquered tiered storage and more.

  • December 21, 2006 21 Dec'06

    Skype Trojan: Much ado about nothing?

    This week in Security Blog Log: A Trojan horse has captured headlines by targeting Skype users. But some believe the threat is being blown out of proportion.

  • December 21, 2006 21 Dec'06

    Microsoft investigates Windows Vista flaw

    Local users could gain elevated system privileges and run malicious commands by exploiting an error within the Windows server library. Vista is among the OS versions affected.

  • December 20, 2006 20 Dec'06

    Top 10 storage acquisitions of 2006

    Industry consolidation was fast and furious this year. We rank the deals by quality, not quantity.

  • December 20, 2006 20 Dec'06

    Seagate to acquire EVault for $185M

    The disk drive maker has plans to tuck the online backup and archiving service provider into its services group.

  • December 19, 2006 19 Dec'06

    Microsoft releases Vista APIs to security vendors

    Microsoft released a draft set of programming interfaces allowing security vendors to develop software using the Windows kernel on 64-bit systems.

  • December 19, 2006 19 Dec'06

    Mozilla fixes multiple Firefox flaws

    Digital miscreants could exploit flaws in Mozilla's popular Firefox browser to bypass security programs, access sensitive information and conduct cross-site scripting attacks.

  • December 19, 2006 19 Dec'06

    Check Point gets big IDS boost from NFR deal

    Analysts say Check Point would gain much-needed intrusion detection and prevention capabilities through its acquisition of NFR Security. The deal should erase bad memories of the aborted Sourcefire deal.

  • December 18, 2006 18 Dec'06

    VoIP hacking exposed in new book

    VoIP hacking is a reality, and in a new book, two VoIP security experts outline the tools and tricks to avoid a system-crushing hack.

  • December 18, 2006 18 Dec'06

    Cisco WLAN design best practices

    Wireless LAN (WLAN) technology has built-in security features, but a one-size-fits-all approach won't ensure adequate security for your organization. This tip provides best practices for designing your security architecture, including user community...

  • December 18, 2006 18 Dec'06

    WLAN interference and clogged pipes -- happy holidays!

    WLAN interference caused by decorations and slowed traffic due to online shopping are just some of the network woes of the holidays.

  • December 17, 2006 17 Dec'06

    Criminals find safety in cyberspace

    A new report from McAfee shows how criminals are enjoying a sense of safety and anonymity in cyberspace that they never had on the street. And they're making more money.

  • December 17, 2006 17 Dec'06

    Top 10 VoIP tips of 2006

    Echo and latency issues top the list in 2006, as seen in our top 10 list of most popular tips. If you have missed any of these tips, now is the time to catch up before the end of the year.

  • December 17, 2006 17 Dec'06

    NAS gateway purchase considerations

    NAS gateways overcome the inherent limitations of scale and flexibility by utilizing externally connected storage as external standalone disk arrays. NAS storage capacity is typically expanded by simply adding more disks to the appliance, but this ...

  • December 15, 2006 15 Dec'06

    Cardiff launches intelligent document system

    Cardiff, a division of Autonomy Corporation, has launched a new system to allow firms to get more out of their on-screen documents.

  • December 14, 2006 14 Dec'06

    Employers to seek more security talent in '07

    Learn what certifications are growing in demand and how employers are looking at the job market in 2007.

  • December 14, 2006 14 Dec'06

    NAS gateway specifications

    A NAS gateway offers file-based accesses to external storage on a disk array -- or a SAN, where users can take advantage of superior performance and reliability while maintaining a level of simplicity. Since storage is moved off of the NAS device, ...

  • December 14, 2006 14 Dec'06

    Schneier: Data breach at UCLA barely newsworthy

    This week in Security Blog Log: Security luminary Bruce Schneier and others sound off on the UCLA data breach that exposed 800,000 people to identity fraud.

  • December 13, 2006 13 Dec'06

    Review: Sky's the limit with Skybox View 3.0

    Hot Pick: Skybox View 3.0 offers a unique and flexible approach for assessing and managing specific threats and overall risk to your digital assets.

  • December 13, 2006 13 Dec'06

    Hosted VoIP eliminates cost, complexity

    Hosted VoIP is being adopted at increasing rates as more and more companies look to avoid the excess costs and complexities of on-premise solutions.

  • December 13, 2006 13 Dec'06

    Third zero-day found in Microsoft Word

    For the third time in a week, a zero-day flaw has been found in Microsoft Word. Users should be cautious when opening attachments from unknown sources.

  • December 13, 2006 13 Dec'06

    Host-based replication

    While the lines of distinction among data protection technologies such as backup, continuous data protection and replication have blurred, host-based replication can play a key role in your overall data protection strategy.

  • December 13, 2006 13 Dec'06

    VoIP management tools: Calculating ROI

    Before purchasing management tools for VoIP, you may need to calculate the return on investment (ROI) to justify the cost of those tools. In this tip, Gary Audin explains how to calculate ROI and provides specific checklists for calculating the ROI ...

  • December 13, 2006 13 Dec'06

    Hosted VoIP eliminates cost, complexity

    Hosted VoIP is being adopted at increasing rates as more and more companies look to avoid the excess costs and complexities of on-premise solutions.

  • December 13, 2006 13 Dec'06

    Sun updates Java Standard Edition

    Sun Microsystems has launched version six of its Java Standard Edition platform, which supports the integration of Java technology with other programming languages

  • December 13, 2006 13 Dec'06

    Eclipse adoption rate on the increase

    The adoption rate of the open source Eclipse integrated development environment has more than doubled in Europe, the Middle East and Africa, industry analysts have revealed.

  • December 13, 2006 13 Dec'06

    Swindon is broadband capital

    Swindon is still the broadband capital of Britain, research on coverage has revealed.

  • December 12, 2006 12 Dec'06

    Mixing SAS and SATA disk drives can cause problems

    Mixing SAS and SATA disk drives in the same enclosure can cause interoperability issues, but vendors are finding workarounds.