News

News Archive

  • February 20, 2007 20 Feb'07

    Microsoft confirms new IE flaw

    Attackers could exploit a new flaw in Internet Explorer (IE) to access local files on targeted systems, Microsoft confirmed Tuesday.

  • February 20, 2007 20 Feb'07

    Google plugs dangerous flaw

    An attacker could exploit a hole in Google Desktop to gain access to users' personal files. Google has released a patch, but experts say not all users are receiving it.

  • February 20, 2007 20 Feb'07

    TJX data breach worse than initially feared

    Hackers had access to a larger amount of customer data, TJX executives said in a statement.

  • February 20, 2007 20 Feb'07

    All about automation

    Automating your IT operations is a trick that creates obvious benefits. In this article, we explain how data center automation can help an entire enterprise.

  • February 19, 2007 19 Feb'07

    Sourcefire fixes Snort flaw

    Attackers could exploit a flaw in the popular open source Snort IDS tool to cause a denial of service or launch malicious code.

  • February 19, 2007 19 Feb'07

    When security firms merge, some users are losers

    Some users see their services improve when IT security vendors merge with other companies or get acquired. Others say they've been left out in the cold.

  • February 19, 2007 19 Feb'07

    Quiz: Compliance improvement -- Get better as you go forward

    A five-question multiple-choice quiz to test your understanding of the content presented by expert Richard Mackey in this lesson of SearchSecurity.com's Compliance School.

  • February 19, 2007 19 Feb'07

    What is presence?

    Presence technology makes it possible to locate and identify a computing device wherever it might be, as soon as the user connects to the network.

  • February 19, 2007 19 Feb'07

    What is unified communications?

    Defining unified communications.

  • February 19, 2007 19 Feb'07

    What is communication-enabled-business processes (CEBP)?

    Defining communication-enabled business processes.

  • February 18, 2007 18 Feb'07

    CDP platform purchase considerations

    Busy IT organizations are employing continuous data protection (CDP) technologies to guard data on the fly, essentially eliminating the backup window and allowing granular file and system restoration -- sometimes down to the individual disk write ...

  • February 15, 2007 15 Feb'07

    News Wrap 2.0

    We've just discovered a great new application for technology that can save you an incredible amount of time, money and heartache.

  • February 14, 2007 14 Feb'07

    VoIP complexities stall implementation for SMBs

    VoIP sales in the SMB market are predicted to lead revenue in the next several years, but most SMBs are confused by the number of different solutions.

  • February 14, 2007 14 Feb'07

    Cancer clinic juggles two-tiered storage environments

    Karmanos Cancer Institute is using two separate tiered storage systems from EMC and Sun, and says it has yet to find a single storage vendor that can meet all its requirements.