News

News Archive

  • November 15, 2006 15 Nov'06

    How can VoIP be integrated into an existing PBX system?

    I am trying to integrate VoIP into my existing PBX system. I have a Talkswitch 48CVA which supports both PSTN and VoIP lines. My main phone number is a landline which forwards calls to my VoIP line when my status is busy or I do not answer.

  • November 15, 2006 15 Nov'06

    EMC, NetApp duke it out in the midrange storage

    As NetApp gains market share in midrange storage, EMC makes a rare response to performance claims.

  • November 14, 2006 14 Nov'06

    SANS: VoIP, zero-day threats surge

    Digital miscreants are using VoIP and a growing pile of zero-day flaws to launch a ferocious wave of targeted, financially-motivated attacks, according to the SANS Institute.

  • November 14, 2006 14 Nov'06

    Fiber optic networks vulnerable to attack

    Fiber optic networks aren't hack-proof: A savvy attacker can crack them with ease.

  • November 13, 2006 13 Nov'06

    Trojan poses as Adobe software update

    The Trojan keylogger comes in an email that asks users to download the latest version of Adobe Reader. It then tries to steal the user's confidential information.

  • November 13, 2006 13 Nov'06

    IM, Skype, P2P open security holes: Survey

    IM, Skype, Web conferencing and other real-time applications are a major concern to IT, but end users seem to shrug off the risks, a new survey has found.

  • November 13, 2006 13 Nov'06

    Firefox antiphishing feature beats Internet Explorer in Mozilla test

    A Firefox automated antiphishing feature beat IE 7 in a test conducted by Mozilla, but analysts say large enterprises should focus on spam blocking software.

  • November 12, 2006 12 Nov'06

    Wireless device flaw discovered

    A Broadcom wireless device driver, common in millions of laptops, is vulnerable to an attack, according to an advisory from the Month of Kernel Bugs.

  • November 08, 2006 08 Nov'06

    High-end clustering users contemplate snapshots

    Some users and analysts say the line between high-performance NAS clusters and enterprise NAS systems continues to blur as clustering vendors begin to include enterprise features.

  • November 08, 2006 08 Nov'06

    The big security/storage crossover: Is your job safe? [Part Two: The analyst]

    Storage and security staff sometimes possess the same skills. What does that mean for your job prospects in the field? In this second part of a four part series, TechTarget ANZ asks Gartner's Phil Sergeant what lies ahead for professionals in these ...

  • November 07, 2006 07 Nov'06

    Big pay for storage jobs, page 6

    Find out what other storage professionals are being paid in this year's salary survey.

  • November 07, 2006 07 Nov'06

    Big pay for storage jobs, page 8

    Big pay for storage jobs, page 8

  • November 07, 2006 07 Nov'06

    Big pay for storage jobs, page 3

    Find out what other storage professionals are being paid in this year's salary survey.

  • November 07, 2006 07 Nov'06

    Big pay for storage jobs, page 7

    Find out what other storage professionals are being paid in this year's salary survey.

  • November 07, 2006 07 Nov'06

    Big pay for storage jobs

    Find out what other storage professionals are being paid in this year's salary survey.

  • November 07, 2006 07 Nov'06

    Big pay for storage jobs, page 4

    Find out what other storage professionals are being paid in this year's salary survey.

  • November 07, 2006 07 Nov'06

    Big pay for storage jobs, page 5

    Find out what other storage professionals are being paid in this year's salary survey.

  • November 07, 2006 07 Nov'06

    Mozilla fixes Firefox flaws

    Attackers could exploit multiple flaws in Firefox, SeaMonkey and Thunderbird to crash machines, bypass security restrictions and launch malicious code.

  • November 07, 2006 07 Nov'06

    Big pay for storage jobs, page 2

    Find out what other storage professionals are being paid in this year's salary survey.

  • November 07, 2006 07 Nov'06

    NetApp to acquire Topio

    Six months after EMC acquired heterogeneous replication provider Kashya, NetApp jumps on the bandwagon by announcing plans to acquire Topio for $160M.

  • November 07, 2006 07 Nov'06

    VMware backup still tough

    VMware backup using Consolidated Backup is easier said than done, according to users at this week's VMworld show in Los Angeles.

  • November 06, 2006 06 Nov'06

    How to manage encryption keys

    Encryption is an effective way to secure data, but the encryption keys used must be carefully managed to ensure data remains protected and accessible when needed.

  • November 06, 2006 06 Nov'06

    Agency improves security grades under CISO's watch

    CISO Philip Heneghan has made security a way of life for the U.S. Agency for International Development (USAID). His work earned him a Security 7 award.

  • November 06, 2006 06 Nov'06

    Softek rides IBM mainframe wave, plans acquisition

    Data migration software provider Softek is planning to acquire Enigma to boost its mainframe storage software business.

  • November 06, 2006 06 Nov'06

    Sourcefire IPO could fuel Snort, users say

    Snort users frowned when Check Point tried to acquire Sourcefire last year. But they are more optimistic about Sourcefire's plans to go public.

  • November 06, 2006 06 Nov'06

    The big security/storage crossover: Is your job safe? [Part One: The recruiter]

    Since EMC acquired RSA and Symantec enveloped Veritas, both have started discussing 'protection' of data as the sensible sequel to both storage and security. In the first of a four part series series, TechTarget ANZ asks several industry experts ...

  • November 05, 2006 05 Nov'06

    Microsoft eyes second zero-day threat in a week

    This time, attackers are going after a zero-day flaw in Windows, and Microsoft has released some workarounds until a patch is available.

  • November 05, 2006 05 Nov'06

    NetApp adds a midrange box, tunes up software

    NetApp adds the FAS3070 to its midrange lineup to compete with EMC's CX3-80 and updates a number of its software products.

  • November 05, 2006 05 Nov'06

    Mobile device encryption - a practice not often applied

    Encryption is the best way to protect data on mobile devices -- but too few companies are actually deploying this critical technology.

  • November 02, 2006 02 Nov'06

    Review: SPI Dynamics' WebInspect 6.1

    SPI Dynamics has created a powerful tool for novices as well as advanced users who will appreciate the time and effort it saves.

  • November 02, 2006 02 Nov'06

    Reporter's Notebook: Whispers and rumbles from SNW

    Floridians talked DR, big guys quibbled over deduplication, and rumors of acquisitions and new products to come flew at SNW Orlando this year.

  • November 01, 2006 01 Nov'06

    Tor network privacy could be cracked

    The Tor network is used by those who want to keep their IP addresses private. But new research shows that it's possible to compromise the system and unmask the user.

  • November 01, 2006 01 Nov'06

    Juniper Networks' enterprise router takes aim at Cisco branches

    Juniper's new branch office J-Series routers provide all-in-one security, VoIP, WAN acceleration box to rival Cisco's ISR router.

  • November 01, 2006 01 Nov'06

    VoIP convergence: Managing staffing issues

    Companies making the transition to IP telephony must find a way to converge their voice and data networks -- and the employees who work on them.

  • November 01, 2006 01 Nov'06

    What is a seamless router?

    In this expert response, Sudhanshu Gupta gives us a quick history lesson in routing when he answers the question "what is meant by the term 'seamless router'?"

  • November 01, 2006 01 Nov'06

    Exploit code released for Apple Wi-Fi flaw

    Details on how to attack a flaw in Apple's wireless software were released as part of a new project called the "Month of Kernel Bugs."

  • October 31, 2006 31 Oct'06

    Flaw found in Firefox 2.0

    Attackers could exploit the security flaw to crash versions 1.5.0.7 and 2.0 of the browser, according to various security advisories.

  • October 31, 2006 31 Oct'06

    E-vaulting's many faces can confuse IT efforts

    E-vaulting is the process that describes how enterprise IT departments ship backup tapes and replicate data to remote disk arrays and VTLs. E-vaulting is not a new concept, but more recently it has grown to mean remote backups and replication for ...

  • October 31, 2006 31 Oct'06

    Five years until FAN's a hit: Brocade Australia

    File Area Networks (FANs) will take around five years to become a ubiquitous piece of enterprise storage infrastructure, according to Graham Schultz, Brocade's Country Manager for Australia.

  • October 31, 2006 31 Oct'06

    Internode covers Coorong with solar-powered broadband

    Internode has blended super-fast ADSL2+ broadband with solar-powered microwave towers to deliver virtually total broadband coverage across South Australia's largest local government region.

  • October 31, 2006 31 Oct'06

    Zero-day attacks target Microsoft Visual Studio

    Microsoft has outlined a series of steps users should take to protect their machines from attacks that exploit a new zero-day flaw in Visual Studio 2005.

  • October 31, 2006 31 Oct'06

    In IT security, vendor size does not compute

    With consolidation gripping the security industry, companies are seeking out the most stable security vendors, but analysts and experts say the biggest firms aren't necessarily the most prudent investment.

  • October 31, 2006 31 Oct'06

    Net neutrality: All or nothing, or somewhere in between?

    The notion of net neutrality can hinder VoIP QoS guarantees and thus has incited a contentious debate.

  • October 30, 2006 30 Oct'06

    Messaging Security School

    SearchSecurity.com's Messaging Security School has brought together some of the most knowledgeable experts in the messaging security field to offer you personal instruction on how to secure the information handled by your organization's knowledge ...