News

News Archive

  • June 06, 2007 06 Jun'07

    Zero-day flaws affect Firefox, IE

    A researcher published details on four new zero-day flaws affecting Firefox and Internet Explorer. They could be exploited to log keystrokes, download malware and steal cookies.

  • June 06, 2007 06 Jun'07

    Network access controlled via biometrics

    Fingerprint readers, a form of biometrics, have been used to protect data and endpoints, but now IT is using the security technology to control network access

  • June 05, 2007 05 Jun'07

    IBM to acquire Watchfire for risk, compliance

    IBM agreed to acquire Waltham, Mass.-based Watchfire Corp. to add Web application and compliance testing tools into Big Blue's Rational development platform.

  • June 05, 2007 05 Jun'07

    Watchfire will help IBM build application security

    Analysts have been pushing the Security 3.0 concept this week at Gartner's IT Security Summit, and one analyst says IBM's acquisition of Watchfire illustrates the trend.

  • June 05, 2007 05 Jun'07

    Avaya to merge with Silver Lake and TPG Capital

    Telephony giant Avaya will be acquired by a private equity firm.

  • June 04, 2007 04 Jun'07

    SMBs sample SaaS via telecoms

    Telecom XO Communications has announced a new, SMB-focused partnership with Jamcracker, a wholesaler of SaaS technology. Analysts say more telecoms will try to offer SMBs IT services with such deals.

  • June 04, 2007 04 Jun'07

    Deploying VoIP: Five things every CIO should know

    Navigating the complexity of a VoIP migration can be overwhelming. Here are five tips to help steer through the fog of a VoIP deployment.

  • June 04, 2007 04 Jun'07

    WAN storage guide -- Chapter 1: WAN basics

    A WAN basically connects two or more LANs. While this may sound like a relatively straightforward goal, the implications of WAN connectivity have had a profound influence on networking. This chapter covers basic WAN information.