News
Networking and communication
-
September 04, 2006
04
Sep'06
Instant messaging boom brings security concerns
Instant messaging (IM) has made significant inroads to the enterprise, but using public IM applications may open up security holes in the network.
-
August 31, 2006
31
Aug'06
Interoperability issues for a 6500 Cisco switch and a 3Comm 7700
In this response, Sudhanshu Gupta talks about the interoperability issues that go along with a 6500 Cisco switch and a 3Comm 7700.
-
August 31, 2006
31
Aug'06
Connecting ISDN PRI to a VPN via a Cisco AS5350
Sudhanshu Gupta examines how to connect an ISDN PRI to a VPN using a Cisco AS5350.
-
August 31, 2006
31
Aug'06
Routing phone calls to a POTS
Sudhanshu Gupta explains how to route all phone calls to a POTS, in this Q&A.
-
August 31, 2006
31
Aug'06
Configuring managed and unmanaged switches
In this Q&A, Sudhanshu Gupta answers which cable to use with managed and unmanaged switches.
-
August 30, 2006
30
Aug'06
VoIP outsourcing: Save money while gaining flexibility
VoIP outsourcing is the way to go for firms looking to deploy voice services quickly and flexibly without a major investment in skills and upkeep.
-
August 29, 2006
29
Aug'06
AT&T breach affects 19,000 customers
Online outlaws hacked into an AT&T computer system and stole credit card data on thousands of customers. AT&T has offered to pay for credit monitoring services for those affected.
-
August 28, 2006
28
Aug'06
Riverbed update offers users more bandwidth, better reporting
Riverbed announced a package of hardware and software updates, which some customers say they've been waiting for.
-
August 28, 2006
28
Aug'06
ProCurve rolls out three new switch series
ProCurve Networking by HP has added three new series of switches to its lineup.
-
August 27, 2006
27
Aug'06
3PAR adds midrange array for secondary sites
3PAR has introduced a smaller version of its InServ Storage Server, which it describes as a product-line extension into its existing customer base.
-
August 27, 2006
27
Aug'06
Duplex mismatch
This article helps networking engineers understand the issues behind duplex mismatch, one of the most troublesome problems in today's Ethernet networks. Learn why duplex mismatch occurs and how you can prevent it with autonegotiation and hard coding.
-
August 22, 2006
22
Aug'06
Column: VoIP applications fuel the next wave of VoIP innovation
The first phase of VoIP is nearing the end and corporations will soon find a variety of third-party desktop applications that run on VoIP. Has VoIP improved the day-to-day for end users?
-
August 21, 2006
21
Aug'06
Briefs: VoiceCon in the news
This week at VoiceCon we saw everything from managed VoIP services to IP phones made to make mobile workers right at home, wherever they are.
-
August 16, 2006
16
Aug'06
Cisco struggles with SIP firewall flaw
Cisco admits it can't reproduce a SIP security flaw in its PIX firewall that was first identified by a researcher at Black Hat.
-
August 16, 2006
16
Aug'06
Briefs: VoIP in the news
Asterisk maker Digium gets major funding; Quintum's VoIP switch offers backup option for branch office; The Cisco Store makes the case for unified communications.
-
August 16, 2006
16
Aug'06
Wireless security push fueled by paranoia
Wireless security became a necessity for Intermagnetics, but when the company used its access points to monitor the spectrum, performance suffered.
-
August 15, 2006
15
Aug'06
Cisco says it can't reproduce PIX flaw
Ever since a researcher at Black Hat outlined a flaw in the PIX firewall, Cisco has been trying to reproduce the security hole. So far, the company has been unsuccessful.
-
August 15, 2006
15
Aug'06
Cisco boosts VoIP certification
The upgraded CCNP midlevel Cisco certification now incorporates VoIP, security and wireless to boost converged network skills among enterprise professionals.
-
August 14, 2006
14
Aug'06
Wireless security boost for laptops outside the office
>Most companies do a pretty good job with wireless security within the office walls, but what happens when end users take their laptops home -- or to Starbucks?
-
August 06, 2006
06
Aug'06
VoIP call quality on the decline
Advances in technology have made VoIP more common, but that hasn't stopped VoIP call quality from dropping steadily over the last 18 months, according to a recent study by Brix Networks.
-
August 03, 2006
03
Aug'06
Vendors reject preferential knowledge sharing
While Cisco continues to investigate a potential PIX firewall flaw, it and other vendors say sharing security information quickly and indiscriminately is always the best policy.
-
August 02, 2006
02
Aug'06
RFID security issues are cause for corporate concern
Although small in nature, RFID tags could be used to attack databases and corrupt critical information. It's a growing concern as corporate RFID use skyrockets, yet experts say there are reasonable ways to mitigate the risks and gain the business ...
-
August 02, 2006
02
Aug'06
Possible Cisco zero-day exploit revealed at Black Hat
Details of an alleged flaw related to SIP and PIX appliances, briefly mentioned in a Wednesday Black Hat presentation, are being kept under wraps as Cisco and US-CERT investigate.
-
July 26, 2006
26
Jul'06
Blue Cross bears burden of 'no wireless' policy
Blue Cross of Idaho had a "no wireless" policy on paper but never really enforced it. That is, until a team of auditors said the company had better do something.
-
June 01, 2006
01
Jun'06
BlueCat appliance offers rock-solid security
Hot Pick: The Adonis 1000 appliance bundles DNS and DHCP into an enterprise-class appliance for the centralized secure operation of network addressing.
-
February 08, 2006
08
Feb'06
MEF drives up quality standards in carrier Ethernet
The Metro Ethernet Forum (MEF) has expanded its certification program to include quality of service parameters in network kit, to ensure service providers can give their customers the service they demand.
-
November 28, 2005
28
Nov'05
Step 6: Configuring wireless clients
With wireless networks proliferating it is a good idea to understand what it takes to build a VPN for a wireless gateway. Contributor and Microsoft MVP Brien Posey details the necessary steps in this step-by-step guide.
-
November 22, 2005
22
Nov'05
Influential survey says security 'set back by 6 years'
Update: The SANS Top 20 vulnerability list for 2005 shows the bad guys attacking flawed apps and paying more attention to network holes.
-
November 21, 2005
21
Nov'05
Wireless security: Public Wi-Fi could open security holes
A Michigan county is working to give everyone within its borders wireless Internet access. But when it comes to security, users are on their own.
-
November 20, 2005
20
Nov'05
Wireless security crucial to railway safety
A transportation firm uses wireless technology to keep the trains running on time. But securing mobile devices isn't easy when they're spread across the globe.
-
November 16, 2005
16
Nov'05
Wireless security: Companies deal with software updates
A health care provider found it could use wireless technology to dramatically boost patient care. But first it had to figure out how to deploy security updates over a wireless network.
-
October 12, 2005
12
Oct'05
Quiz: What's your infosec IQ?
We've collected our toughest questions to see how well you stand up to a challenge. Put your knowledge to the test and let us know how you do.
-
October 10, 2005
10
Oct'05
Don't discount software distribution sites as attack vectors
There's a potential downside to update sites, which offer virtually untapped riches to bad guys wanting to compromise your network. Just ask the author.
-
September 26, 2005
26
Sep'05
NHS trust creates wireless record
University College London Hospitals (UCLH) NHS Trust has created the UK's largest single wireless network to support 7,000 users across eight hospitals.
-
September 20, 2005
20
Sep'05
SAS drives product roundup
Serial-attached SCSI (or SAS) drives offer significant storage capacity at a much lower cost, while maintaining reasonable performance. Find out who the vendors are in this market.
-
September 13, 2005
13
Sep'05
Ethernet users given greater product interoperability
A new network hardware testing standard will encourage enterprises, service providers and telcos to adopt cheaper and more flexible Ethernet technology for data, voice and video connectivity.
-
September 11, 2005
11
Sep'05
VoIP turns up the heat on firewalls
New research shows that many organizations are increasingly concerned about VoIP security and plan to augment their firewalls within the next year, changing the landscape of the firewall market.
-
September 05, 2005
05
Sep'05
Extending perimeters
The news that, up until 2006, 70% of successful wireless local area network (WLAN) attacks will be because of the misconfiguration of WLAN access points and client software is disquieting on a number of levels.
-
August 30, 2005
30
Aug'05
Myfip's Titan Rain connection
LURHQ researchers say the Myfip worm is a good example of the malcode Chinese hackers are using in the so-called Titan Rain attacks against U.S. government networks.
-
August 30, 2005
30
Aug'05
Passive fingerprinting: Applications and prevention
In this excerpt from the book Silence on the Wire, author Michal Zalewski discusses both malicious and beneficial uses for passive fingerprinting, and how to prevent successful passive fingerprinting on your network.
-
August 29, 2005
29
Aug'05
Storage area network quiz
It's all about the storage area network (SAN) -- man. The more you know, the easier it is. Take our SAN quiz and find out where you stand as a SAN guru.
-
July 26, 2005
26
Jul'05
VoIP encryption to have 'Pretty Good Privacy
-
July 12, 2005
12
Jul'05
Tony Asaro: Blogs and more
Read what Tony Asaro is talking about in this month's blog, and listen to him speak in a number of webcasts.
-
June 13, 2005
13
Jun'05
Gartner underscores five overblown threats
Two Gartner analysts debunk five overhyped security risks they claim are causing companies to miss out on some key emerging technologies.
-
May 11, 2005
11
May'05
A new era of computer worms: Wireless mobile worms
In this excerpt of Chapter 9 from "The Art of Computer Virus Research and Defense," author Peter Szor dissects the Cabir worm.
-
March 31, 2005
31
Mar'05
External datacentre suits Selfridges
Selfridges has outsourced its datacentre and other IT functions to Retail Assist. The outsourcer will provide network management,...
-
March 08, 2005
08
Mar'05
Small businesses targeted with RFID
-
December 01, 2004
01
Dec'04
Phreaks love Bluetooth
Bluetooth is becoming the vector of choice for next-generation phone phreakers to swipe files from other users, make calls or render mobile phones completely useless.
-
August 27, 2004
27
Aug'04
Over-specify when buying low cost replacement for Frame Relay
A project manager reveals how a VPN saved £275,000 a year
-
July 07, 2004
07
Jul'04
Deals abound for high-end storage
Think high-end storage is out of your reach? Maybe not. Conversations with several storage buyers recently suggest that vendors are scrambling to give buyers the best possible deals.