News
News Archive
-
November 05, 2006
05
Nov'06
NetApp adds a midrange box, tunes up software
NetApp adds the FAS3070 to its midrange lineup to compete with EMC's CX3-80 and updates a number of its software products.
-
November 05, 2006
05
Nov'06
Mobile device encryption - a practice not often applied
Encryption is the best way to protect data on mobile devices -- but too few companies are actually deploying this critical technology.
-
November 02, 2006
02
Nov'06
Review: SPI Dynamics' WebInspect 6.1
SPI Dynamics has created a powerful tool for novices as well as advanced users who will appreciate the time and effort it saves.
-
November 02, 2006
02
Nov'06
Reporter's Notebook: Whispers and rumbles from SNW
Floridians talked DR, big guys quibbled over deduplication, and rumors of acquisitions and new products to come flew at SNW Orlando this year.
-
November 01, 2006
01
Nov'06
Tor network privacy could be cracked
The Tor network is used by those who want to keep their IP addresses private. But new research shows that it's possible to compromise the system and unmask the user.
-
November 01, 2006
01
Nov'06
Juniper Networks' enterprise router takes aim at Cisco branches
Juniper's new branch office J-Series routers provide all-in-one security, VoIP, WAN acceleration box to rival Cisco's ISR router.
-
November 01, 2006
01
Nov'06
VoIP convergence: Managing staffing issues
Companies making the transition to IP telephony must find a way to converge their voice and data networks -- and the employees who work on them.
-
November 01, 2006
01
Nov'06
What is a seamless router?
In this expert response, Sudhanshu Gupta gives us a quick history lesson in routing when he answers the question "what is meant by the term 'seamless router'?"
-
November 01, 2006
01
Nov'06
Exploit code released for Apple Wi-Fi flaw
Details on how to attack a flaw in Apple's wireless software were released as part of a new project called the "Month of Kernel Bugs."
-
October 31, 2006
31
Oct'06
Flaw found in Firefox 2.0
Attackers could exploit the security flaw to crash versions 1.5.0.7 and 2.0 of the browser, according to various security advisories.
-
October 31, 2006
31
Oct'06
E-vaulting's many faces can confuse IT efforts
E-vaulting is the process that describes how enterprise IT departments ship backup tapes and replicate data to remote disk arrays and VTLs. E-vaulting is not a new concept, but more recently it has grown to mean remote backups and replication for ...
-
October 31, 2006
31
Oct'06
Five years until FAN's a hit: Brocade Australia
File Area Networks (FANs) will take around five years to become a ubiquitous piece of enterprise storage infrastructure, according to Graham Schultz, Brocade's Country Manager for Australia.
-
October 31, 2006
31
Oct'06
Internode covers Coorong with solar-powered broadband
Internode has blended super-fast ADSL2+ broadband with solar-powered microwave towers to deliver virtually total broadband coverage across South Australia's largest local government region.
-
October 31, 2006
31
Oct'06
Zero-day attacks target Microsoft Visual Studio
Microsoft has outlined a series of steps users should take to protect their machines from attacks that exploit a new zero-day flaw in Visual Studio 2005.
-
October 31, 2006
31
Oct'06
In IT security, vendor size does not compute
With consolidation gripping the security industry, companies are seeking out the most stable security vendors, but analysts and experts say the biggest firms aren't necessarily the most prudent investment.
-
October 31, 2006
31
Oct'06
Net neutrality: All or nothing, or somewhere in between?
The notion of net neutrality can hinder VoIP QoS guarantees and thus has incited a contentious debate.
-
October 30, 2006
30
Oct'06
Messaging Security School
SearchSecurity.com's Messaging Security School has brought together some of the most knowledgeable experts in the messaging security field to offer you personal instruction on how to secure the information handled by your organization's knowledge ...
-
October 30, 2006
30
Oct'06
Instant messaging attacks rise in October
In October alone, security firm Akonix Systems tracked 88 attacks that used instant messaging programs to spread. Attackers are also exploiting P2P programs.
-
October 30, 2006
30
Oct'06
Countermeasures for malicious email code
Today's malware continues to raise the security stakes. Enterprises are now facing numerous evolving threats like targeted and blended attacks, zero-day exploits, botnets and phishing schemes. The attacks aren't the only things evolving; so are ...
-
October 30, 2006
30
Oct'06
Wireless network security testing
The abundance of wireless devices is making wireless networks -- both authorised and unauthorised -- more common. Attack your own wireless networks to find vulnerabilities before malicious hackers do. Security testing expert Kevin Beaver covers the ...
-
October 30, 2006
30
Oct'06
Storage vendors polish their wares at SNW
EMC upgrades recovery management software, HP unveils a storage blade and VTL gateway for the EVA; IBM sweetens warranty for DS8000; Symantec updates Backup Exec and Ghost.
-
October 30, 2006
30
Oct'06
Storage vendors polish their wares at SNW, page 2
EMC upgrades recovery management software, HP unveils a storage blade and VTL gateway for the EVA; IBM sweetens warranty for DS8000; Symantec updates Backup Exec and Ghost.
-
October 30, 2006
30
Oct'06
Survey: Data breach costs surge
A new study by the Ponemon Institute finds a 31% increase in the costs associated with a data breach.
-
October 30, 2006
30
Oct'06
Firefox fans unfazed by IE 7
IT administrators like the security improvements in IE 7. But for those who use Firefox, Microsoft's browser upgrade isn't enough to make them switch.
-
October 26, 2006
26
Oct'06
Achieving compliance: a real-world roadmap
A security manager's responsibilities extend beyond the technical aspects of the job. These days, effective governance and compliance are just as essential.
-
October 26, 2006
26
Oct'06
Security Blog Log: The never-ending PatchGuard debate
This week, security vendor fright over the Windows Vista PatchGuard feature permeates the blogosphere. Is Microsoft the boogeyman, or just misunderstood?
-
October 26, 2006
26
Oct'06
What storage managers are buying and why
The second installment of the 2006 edition of Storage magazine's exclusive Purchasing Intentions Survey reveals key storage technology purchasing decisions by storage managers across all industries.
-
October 26, 2006
26
Oct'06
IT greats: Top 10 greatest IT people
For every world-famous name with a world famous fortune – think Bill Gates, Steve Jobs and Michael Dell – there are hundreds of other individuals who have moved the IT industry and its technology inexorably forward
-
October 25, 2006
25
Oct'06
Cisco launches mega videoconferencing system
Cisco Systems Inc. has talked about TelePresence and demonstrated it, and now it's finally something enterprises can buy, but at six figures it's a high price to pay.
-
October 25, 2006
25
Oct'06
Video, audio are network drains
Network misuse is rampant, according to a recent survey. Employees using the corporate network for recreation or high-bandwidth business can put a strain on network resources, but network engineers can combat that with filtering and monitoring.
-
October 25, 2006
25
Oct'06
Sourcefire looking to go public
The company behind the popular Snort open source IDS tool is making a bid to go public, months after its deal to be acquired by Check Point collapsed.
-
October 25, 2006
25
Oct'06
EMC shuffles channel deck
EMC announced on its earnings call earlier this month that it would be cutting management jobs as part of a round of 1,250 layoffs, and it looks like at least a couple of those positions have already gone from the channel group.
-
October 25, 2006
25
Oct'06
Research shows massive botnet growth
Reports from McAfee and Microsoft show bot herders are gaining ground and threatening national infrastructure. Some suppliers hope to strike back by sharing resources.
-
October 24, 2006
24
Oct'06
How does the service provider differentiate between data and VoIP as data?
For our mobile devices in trucks, we use GSM/GPRS communication. Our customers are paying for a certain data amount -- depending on the service package to which they subscribe. We use a modem in our device, which can do both data and voice. But as I...
-
October 23, 2006
23
Oct'06
What storage managers are buying and why, page 3
What storage managers are buying and why
-
October 23, 2006
23
Oct'06
What storage managers are buying and why, page 7
What storage managers are buying and why
-
October 23, 2006
23
Oct'06
Symantec patches AntiVirus Corporate Edition flaw
Attackers could exploit a flaw in Symantec AntiVirus Corporate Edition and Client Security to overwrite kernel addresses, crash machines and run malicious code.
-
October 23, 2006
23
Oct'06
What storage managers are buying and why, page 2
-
October 23, 2006
23
Oct'06
Comparing VoIP vendors
For many companies, the tough decision isn't whether to use IP telephony or not -- it's which vendor to choose. We've collected some of Carrie Higbie's tips and tricks for vendor selection, garnered from her "Ask-the-Expert" section. Carrie ...
-
October 23, 2006
23
Oct'06
What storage managers are buying and why, page 6
What storage managers are buying and why
-
October 23, 2006
23
Oct'06
Comparing VoIP vendors
For many companies, the tough decision isn't whether to use IP telephony or not -- it's which vendor to choose. We've collected some of Carrie Higbie's tips and tricks for vendor selection, garnered from her 'Ask-the-Expert' section. Carrie ...
-
October 23, 2006
23
Oct'06
SATA boosts RAID 6 use
High-capacity SATA disks are driving up the use of RAID 6, which has prompted vendors to create new ways of overcoming the performance hit incurred with dual-parity protection.
-
October 23, 2006
23
Oct'06
Security researcher, professor influences students for life
Dorothy Denning, a professor of defense analysis at the Naval Postgraduate School, has contributed to the field of data security. Her work earned her a Security 7 award.
-
October 23, 2006
23
Oct'06
SDL expected to help fulfil Vista security promises
Windows Vista is expected to be the most secure Microsoft product released thanks to the company's implementation of the Security Development Lifecycle (SDL).
-
October 23, 2006
23
Oct'06
QLogic dives into directors
QLogic will announce its new SanBox 9000 director this week, but it's missing true director-class features and is encroaching on a market already dominated by Brocade and Cisco.
-
October 23, 2006
23
Oct'06
IT executives eager to exploit Web 2.0 wave
What good is a blog if no one reads it? IT managers find out and begin to make blogging and other Web 2.0 tools a more strategic part of their business.
-
October 23, 2006
23
Oct'06
Boston Celtics face off against spyware
One of the Boston Celtics' toughest opponents was spyware until the IT shop fought back. The team's IT chief explains how he gained the upper hand.
-
October 22, 2006
22
Oct'06
Information Security Decisions Session Downloads
Session Downloads from Information Security Decisions 2006 Conference.
-
October 22, 2006
22
Oct'06
Enhanced Identity and Access Management
From consolidating directories to automating provisioning and rolling out single sign-on, these sessions identify how leading organizations are strengthening authorization and enforcing access controls.
-
October 22, 2006
22
Oct'06
Snyder On Security: An insider's guide to the essentials
Joel Snyder, senior partner with consultancy Opus One, provides an in-depth look at information security trends and technologies.