News
News Archive
-
August 27, 2006
27
Aug'06
Duplex mismatch
This article helps networking engineers understand the issues behind duplex mismatch, one of the most troublesome problems in today's Ethernet networks. Learn why duplex mismatch occurs and how you can prevent it with autonegotiation and hard coding.
-
August 24, 2006
24
Aug'06
Are tape backups a thing of the past when it comes to disaster recovery?
I guess we have to look at disaster recovery, when it comes to tapes, in order of priorities. So, if we're talking about your most critical applications nowadays -- your most critical data -- tape backup is actually losing favor to disk backup or ...
-
August 24, 2006
24
Aug'06
Should I back up the operating system files?
We hear a lot about single-instance storage; single-instance backup. When you start backing up operating system files, you will have the same .DLL, for example, on each of your Windows servers -- you may have 100 servers. I would say, if you have a ...
-
August 24, 2006
24
Aug'06
How do I establish recovery priority for my applications?
If it's at the IT level, it comes from a data perspective. When you start moving up a little bit into the business side, people start looking at the applications because they don't really know where the data is. If we talk today about virtualization...
-
August 24, 2006
24
Aug'06
Security Blog Log: Opinions abound on IBM/ISS deal
Bloggers ponder what IBM's acquisition of ISS says about the industry as a whole. Is the end in sight for independent security vendors?
-
August 24, 2006
24
Aug'06
How do I identify what data to replicate and what data to simply backup?
It goes back again to the value of the data to your organization -- or the impact of losing access to this data. Typically, from a business continuity perspective, the best way to establish this is through what we call a "business impact analysis," ...
-
August 24, 2006
24
Aug'06
What is the difference between RPO and RTO (from a backup perspective)?
The recovery point objective (RPO) and the recovery time objective (RTO) are two very specific parameters that are closely associated with recovery. The RTO is how long you can basically go without a specific application. This is often associated ...
-
August 24, 2006
24
Aug'06
What is the most important aspect of data protection when it comes to DR?
You could answer that with one word really, and I would have to say "testing." Just "testing." Whatever you do when you're protecting data, whether it's a backup, whether it's replication, whatever it is, make sure that you test what you put in ...
-
August 24, 2006
24
Aug'06
Weekly compilation of storage news
Symantec peddles enterprise vault toolT and the new features developed because of a recent update to the US Federal Rules of Civil Procedure.
-
August 24, 2006
24
Aug'06
Aren't backups and archives essentially the same thing?
The answer to that can be a "yes" and "no." If we look at a very high level, a copy of data is a copy of data, and that's where a lot of people confuse both as being somewhat the same -- one copy is just kept longer. When we start digging into what ...
-
August 24, 2006
24
Aug'06
What do tiered storage and ILM have to do with disaster recovery?
That idea ties back into the topics of data growth, data control, data management and recoverability. Once you start categorizing your data based on criticality and recovery priority, it gives you an indication of your data segments. We have our ...
-
August 24, 2006
24
Aug'06
How far apart should my production and alternate recovery sites be?
As a good consultant, I would have to use the typical answer; it depends. We have a few things to consider here. First, what kind of disaster are you trying to protect yourself (or your organization) from? Second, what is your geography like?
-
August 24, 2006
24
Aug'06
Cisco patches flaws in multiple products
Attackers could corrupt files, cause a denial of service and bypass security restrictions via flaws in several of Cisco's firewall and VPN products.
-
August 23, 2006
23
Aug'06
Remote access, WAN optimization, and network analysis news
Briefs: Remote access from Positive Networks helps with disaster recovery plans; Ipanema Technologies provides WAN optimization; Lancope rolls out network behavior analysis and response system tools.
-
August 22, 2006
22
Aug'06
Column: VoIP applications fuel the next wave of VoIP innovation
The first phase of VoIP is nearing the end and corporations will soon find a variety of third-party desktop applications that run on VoIP. Has VoIP improved the day-to-day for end users?
-
August 21, 2006
21
Aug'06
Briefs: VoiceCon in the news
This week at VoiceCon we saw everything from managed VoIP services to IP phones made to make mobile workers right at home, wherever they are.
-
August 21, 2006
21
Aug'06
IBM spruces up storage line
IBM floated a raft of announcements across its storage line, but analysts say they are still waiting for the updates stuck in the research phase.
-
August 21, 2006
21
Aug'06
Update: Microsoft fixes faulty Internet Explorer patch
Update: Microsoft has fixed a faulty browser fix that enabled an exploitable condition. Souces say a compatibility problem with Systems Management Server delayed the fix.
-
August 20, 2006
20
Aug'06
AOL data spill leads to dismissals, resignation
AOL has fired two employees and its CTO has left the company after search data from 658,000 customers was accidentally exposed earlier this month.
-
August 20, 2006
20
Aug'06
Twin Trojans use PowerPoint to spread
Researchers aren't yet sure if troublesome new Trojan horse programs are exploiting a new PowerPoint flaw or the vulnerabilities Microsoft patched Aug. 8.
-
August 20, 2006
20
Aug'06
Preparing for 'little disasters' often neglected
Tom Dugan, CTO of Recovery Networks, says it's common for users to prepare to lose an entire building -- but aren't ready for small-scale losses – like losing a server.
-
August 17, 2006
17
Aug'06
Apple fixes Xsan security flaw
Attackers could exploit a security flaw in Apple's Xsan file system to launch malicious code and crash vulnerable machines, but a fix is available.
-
August 16, 2006
16
Aug'06
Cisco struggles with SIP firewall flaw
Cisco admits it can't reproduce a SIP security flaw in its PIX firewall that was first identified by a researcher at Black Hat.
-
August 16, 2006
16
Aug'06
Briefs: VoIP in the news
Asterisk maker Digium gets major funding; Quintum's VoIP switch offers backup option for branch office; The Cisco Store makes the case for unified communications.
-
August 16, 2006
16
Aug'06
Wireless security push fueled by paranoia
Wireless security became a necessity for Intermagnetics, but when the company used its access points to monitor the spectrum, performance suffered.
-
August 15, 2006
15
Aug'06
Cisco says it can't reproduce PIX flaw
Ever since a researcher at Black Hat outlined a flaw in the PIX firewall, Cisco has been trying to reproduce the security hole. So far, the company has been unsuccessful.
-
August 15, 2006
15
Aug'06
Cisco boosts VoIP certification
The upgraded CCNP midlevel Cisco certification now incorporates VoIP, security and wireless to boost converged network skills among enterprise professionals.
-
August 15, 2006
15
Aug'06
Qualcomm to halve storage growth in 2007
Wireless chipmaker Qualcomm expects to slow down its storage growth by at least 50% next year using a capacity utilisation tool from MonoSphere.
-
August 14, 2006
14
Aug'06
EMC sheds light on RSA integration plans
As the dust begins to settle on EMC's $2.1 billion acquisition of RSA Security, the hard work of integration begins. What's EMC strategy here?
-
August 14, 2006
14
Aug'06
Mocbot update targets MS06-040 flaw
Security experts raised the red flag Sunday as new malware targets the Windows flaw addressed in the MS06-040 patch. Attackers are using the flaw to expand IRC-controlled botnets.
-
August 14, 2006
14
Aug'06
Wireless security boost for laptops outside the office
>Most companies do a pretty good job with wireless security within the office walls, but what happens when end users take their laptops home -- or to Starbucks?
-
August 10, 2006
10
Aug'06
Security Blog Log: Israeli-Hezbollah war spills into cyberspace
This week blogosphere warily watches online attacks inspired by the Mideast conflict and rants over the latest security incidents at AOL and the VA.
-
August 10, 2006
10
Aug'06
Vista kernel limits have security vendors on edge
Microsoft's PatchGuard feature will prevent extension of Windows Vista kernel, and antivirus vendors say it'll make it harder for them to produce good security products.
-
August 10, 2006
10
Aug'06
Symantec fixes Backup Exec flaw
Attackers could exploit flaws in Symantec Backup Exec 9.1 and 9.2 for NetWare Servers to cause a denial of service, launch malicious code and gain access to vulnerable machines.
-
August 09, 2006
09
Aug'06
Xiotech resurfaces with data compliance focus
Xiotech has been busy acquiring a legal discovery software vendor and building a data compliance practice, but what about storage?
-
August 08, 2006
08
Aug'06
Cheat sheet: Access management solutions and their pros and cons
Popular authentication methods such as passwords, biometrics and two-factor are assessed in this chart.
-
August 08, 2006
08
Aug'06
Users cautious about Brocade-McData merger
Customers are worried about McData switches interoperating with other products and how Brocade will handle product overlap.
-
August 06, 2006
06
Aug'06
Security Bytes: CA fixes eTrust Antivirus flaws
Online thieves steal $700,000 from personal accounts, researchers expose e-passport vulnerability; and arrests are made in the VA security breach case.
-
August 06, 2006
06
Aug'06
VoIP call quality on the decline
Advances in technology have made VoIP more common, but that hasn't stopped VoIP call quality from dropping steadily over the last 18 months, according to a recent study by Brix Networks.
-
August 03, 2006
03
Aug'06
Ajax threats worry researchers
Black Hat: While it makes smooth Web applications like Google Maps possible, the rush to adopt Ajax may fuel haphazard development and a feeding frenzy among hackers.
-
August 03, 2006
03
Aug'06
Vendors reject preferential knowledge sharing
While Cisco continues to investigate a potential PIX firewall flaw, it and other vendors say sharing security information quickly and indiscriminately is always the best policy.
-
August 03, 2006
03
Aug'06
EMC updates SAN Advisor design tool
EMC's SAN design tool now recognises zones and allows users to customise rules; HP and EMC sign five-year cross-licensing deal.
-
August 02, 2006
02
Aug'06
Twelve Microsoft fixes coming on Patch Tuesday
Microsoft Tuesday will release a dozen new security bulletins for its Windows and Office products, likely including fixes for several outstanding PowerPoint flaws.
-
August 02, 2006
02
Aug'06
Mobile security begins with policy
Mobile security can no longer be an afterthought. Mobile experts say security starts, but doesn't end, with policy.
-
August 02, 2006
02
Aug'06
RFID security issues are cause for corporate concern
Although small in nature, RFID tags could be used to attack databases and corrupt critical information. It's a growing concern as corporate RFID use skyrockets, yet experts say there are reasonable ways to mitigate the risks and gain the business ...
-
August 02, 2006
02
Aug'06
Possible Cisco zero-day exploit revealed at Black Hat
Details of an alleged flaw related to SIP and PIX appliances, briefly mentioned in a Wednesday Black Hat presentation, are being kept under wraps as Cisco and US-CERT investigate.
-
August 02, 2006
02
Aug'06
SRM tools improve storage planning and deployment
Why are storage administrators struggling to identify their storage resources and utilise those resources to their best potential?
-
August 02, 2006
02
Aug'06
SRM tools improve storage planning and deployment, page 2
Storage administrators are struggling to identify their storage resources and utilise those resources to their best potential
-
August 01, 2006
01
Aug'06
Arun Taneja: Blogs and more
Monthly blogs by Arun Taneja, as well as other material by this storage expert.
-
August 01, 2006
01
Aug'06
Security Bytes: Exploits targeting freshly patched Apple flaw
Apple patches nearly two dozen holes in OS X, but not before exploits are unleashed. Plus McAfee fixes a critical flaw and EMC gets the OK to buy RSA.