IT strategy
IT strategy (information technology strategy) is a comprehensive plan that outlines how technology should be used to meet IT and business goals.. See complete definition.
- 
				News
					04 Nov 2025
					
									
										
									
								Microsoft’s $15.2bn investment in the UAE: A strategic bet on AI, talent and trust
Microsoft’s decade-long investment in the United Arab Emirates underscores its commitment to building a robust artificial intelligence ecosystem, advancing digital infrastructure and fostering local talent through a strategic partnership with G42 Continue Reading
By- Andrea Benito , Computer Weekly
 
 - 
				Opinion
					03 Nov 2025
					
									
										
									
								CISOs in court: Balancing cyber resilience and legal accountability
The Computer Weekly Security Think Tank considers the burdens and responsibilities that accompany the role of chief information security officer, and share guidance on how to navigate a challenging career path. Continue Reading
 
- 
                News
                24 May 2007
                
                            
                            Microsoft investigates new Office zero-day flaw
Attackers could exploit a newly-discovered zero-day flaw in Office 2000 to run malicious code on targeted machines, Symantec warned. Continue Reading
By - 
                News
                21 May 2007
                
                            
                            Mobile instant messaging enhances company's business processes
A mobile IM service acquired by a hosted VoIP provider encourages more companies to enhance their business processes. Continue Reading
By- Kate Dostart, Associate Editor
 
 - 
                News
                16 May 2007
                
                            
                            Screencast: How to configure a UTM device
In this exclusive screencast, expert David Strom demonstrates the configuration options available in SonicWall's unified threat management product. Continue Reading
 - 
                News
                16 May 2007
                
                            
                            When signature based antivirus isn't enough
Zero-day exploits, targeted attacks and increasing demands for endpoint application controls are driving the rapid metamorphosis from signature-based antivirus and antispyware to HIPS-based integrated products. Continue Reading
By- Neil Roiter, TechTarget
 
 - 
                News
                11 May 2007
                
                            
                            Cisco fixes fresh flaws in IOS
Attackers could exploit two flaws in Cisco's IOS to cause a denial of service or tamper with data in a device file system. Continue Reading
By- SearchSecurity.com Staff
 
 - 
                News
                11 May 2007
                
                            
                            VoIP, unified communications adoption continue to rise
VoIP and unified communications adoption continue to rise steadily in the enterprise, according to Infonetics Research's latest report. Continue Reading
By- Kate Dostart, Associate Editor
 
 - 
                Feature
                10 May 2007
                
                            
                            ISCSI TCP/IP TOE card specifications
Key specifications for a cross-section of popular iSCSI TOE cards. Continue Reading
 - 
                News
                08 May 2007
                
                            
                            Companies plug FTP holes with secure FTP servers
Some companies are investing in secure FTP suites to give employees and business partners the ability to transfer large files such as large documents, audio, video and photos. Continue Reading
By- Robert Westervelt, TechTarget
 
 - 
                News
                03 May 2007
                
                            
                            Quiz: Enterprise strategies for protecting data at rest
A five-question multiple-choice quiz to test your understanding of the e-discovery content presented by expert Perry Carpenter in this lesson of SearchSecurity.com's Data Protection Security School. Continue Reading
 - 
                News
                03 May 2007
                
                            
                            Quiz: Demystifying data encryption
A five-question multiple-choice quiz to test your understanding of the data encryption content presented by expert Tom Bowers in this lesson of SearchSecurity.com's Data Protection Security School. Continue Reading
 - 
                News
                03 May 2007
                
                            
                            Microsoft users sticking with third-party security vendors
IT pros are pleased with Microsoft's security advances, including those found in Forefront. But don't expect them to drop their third-party security vendors. Continue Reading
By - 
                News
                02 May 2007
                
                            
                            Microsoft to release DNS patch Tuesday
In addition to a fix for the DNS Server Service flaw, Microsoft plans to patch critical flaws in Windows, Office, Exchange, CAPICOM and BizTalk. Continue Reading
By - 
                News
                26 Apr 2007
                
                            
                            New image spam sneaks into inboxes
Researchers at Secure Computing Corp. have discovered a new form of image spam that is sneaking into corporate systems and clogging inboxes. Continue Reading
By- Robert Westervelt, TechTarget
 
 - 
                News
                26 Apr 2007
                
                            
                            Websense to acquire SurfControl
Websense says its planned $400 million acquisition of SurfControl will allow it to better compete in the global security market. Continue Reading
By - 
                News
                24 Apr 2007
                
                            
                            Scaling storage networks demands careful consideration
In the Fibre Channel world, scaling often means adding more and faster switch ports to extend the fabric's bandwidth and connectivity. But IP storage (mainly iSCSI) is a growing area of SAN expansion, using ubiquitous Ethernet network technology to pass storage data between storage devices. This requires the use of IP switches and routers, and can involve the deployment of iSCSI TOE host adapters to offload iSCSI traffic from the local server's CPU. This Buying Guide is intended to help clarify the principle considerations involved scaling storage networks and each chapter offers a set of buying points and product specifications that can help readers identify prospective new scaling products. Continue Reading
 - 
                Feature
                24 Apr 2007
                
                            
                            Storage consolidation: WAN acceleration and WAFS technology overview
One important avenue of storage consolidation is the consolidation of remote office storage; this is where WAN acceleration and WAFS technology comes into play. Continue Reading
 - 
                Feature
                24 Apr 2007
                
                            
                            IP storage switch and router specifications
Key specifications for a cross section of popular IP storage switch and router products. Continue Reading
 - 
                News
                24 Apr 2007
                
                            
                            Apple fixes 25 Mac OS X flaws
Attackers could exploit about two dozen flaws in Mac OS X to cause a denial of service, bypass security restrictions, disclose sensitive data and run malicious code. Continue Reading
By- SearchSecurity.com Staff
 
 - 
                News
                23 Apr 2007
                
                            
                            Weekly compilation of storage news:Dell LTO-4 drive, new Sun array
Dell is first out of the gate with the new LTO-4 drive, which offers native encryption; Sun unveils new array and deepens its relationship with FalconStor. Continue Reading
By- SearchStorage.com Staff
 
 - 
                Feature
                19 Apr 2007
                
                            
                            Skype to the desk phone saves company a bundle
Skype on the desk phone has helped a Chicago-based furniture maker save a considerable amount of money on long-distance voice charges. Continue Reading
By- Andrew R. Hickey, Senior News Writer
 
 - 
                News
                17 Apr 2007
                
                            
                            SNW: Users wary of outsourcing backup
Symantec unveiled plans for outsourced, online data backup services this week, but users at Storage Networking World are more cautious than ever about letting go of their data. Continue Reading
By- Jo Maitland, TechTarget
 
 - 
                News
                17 Apr 2007
                
                            
                            Storage consolidation: Disks and disk subsystems overview
Any storage consolidation effort must involve a serious consideration of disk subsystems and the specific disk types that those systems will contain Continue Reading
 - 
                News
                16 Apr 2007
                
                            
                            EMC, Symantec to enter Software as a Service market
EMC has plans to release Software as a Service (SaaS) products for data backup and archiving; Symantec announces a new online backup service. Continue Reading
By- Beth Pariseau, Senior News Writer
 
 - 
                News
                16 Apr 2007
                
                            
                            DNS worm strikes at Microsoft flaw
A new worm called Rinbot.BC exploits the Microsoft DNS flaw by installing an IRC bot on infected machines and scanning for other vulnerable servers. Continue Reading
 - 
                Feature
                16 Apr 2007
                
                            
                            Inside MSRC: Windows Vista security update explained
Microsoft's Christopher Budd details the first Windows Vista security updates. Continue Reading
By- Christopher Budd, security program manager for the Microsoft Security Response Center (MSRC)
 
 - 
                News
                15 Apr 2007
                
                            
                            Malware outbreak 'largest in almost a year'
Security firm Postini and the SANS Internet Storm Center said they are tracking a significant malware outbreak. Postini calls it the biggest email attack in almost a year. Continue Reading
By - 
                News
                12 Apr 2007
                
                            
                            Microsoft investigates DNS server flaw
Attackers could exploit a DNS flaw in Microsoft Windows 2000 Server and Windows Server 2003 and run malicious code on the system. A workaround is suggested until a patch is issued. Continue Reading
By- SearchSecurity.com Staff
 
 - 
                News
                12 Apr 2007
                
                            
                            Microsoft DNS server flaw called dangerous
UPDATE: Microsoft said Sunday that attacks are still limited, but a proof of concept code to exploit the vulnerability is publicly available. Continue Reading
By- Robert Westervelt, TechTarget
 
 - 
                News
                11 Apr 2007
                
                            
                            Instant messaging threats become more sophisticated
Instant messaging faces greater threats as more enterprises begin to utilize it, making it a more appealing target to hackers. Continue Reading
By- Kate Dostart, Associate Editor
 
 - 
                News
                11 Apr 2007
                
                            
                            Architectural firm swaps online data backup service providers
As online data backup services take off, one early adopter slashed costs dramatically by switching to a newer service on the market. Continue Reading
By- Beth Pariseau, Senior News Writer
 
 - 
                News
                10 Apr 2007
                
                            
                            Capacity planning software specifications
Gauging storage needs over time is one of the biggest challenges faced by IT administrators, and a new generation of capacity planning tools is emerging to help forecast growth and utilisation of storage resources. Continue Reading
 - 
                News
                09 Apr 2007
                
                            
                            HP renews SMB storage campaign
With the launch of the new All-in-One 1200 and the shifting of executives to a new SMB business unit, HP is focused on its low-end products in an effort to boost growth. Continue Reading
By- Beth Pariseau, Senior News Writer
 
 - 
                News
                08 Apr 2007
                
                            
                            How data deduplication eases storage requirements
Storage administrators are struggling to handle spiraling volumes of documents, audio, video, images and large email attachments. Adding storage is not always the best solution, and many companies are turning to data reduction technologies such as data deduplication. This article explains the basic principles of data deduplication, and looks at implementation issues. Continue Reading
 - 
                News
                08 Apr 2007
                
                            
                            Spam campaign uses Storm-like attack technique
Spammers used an attack technique much like last January's "Storm" assault to dupe people into downloading malware over the weekend. This time, they used fake WWIII headlines. Continue Reading
By - 
                News
                08 Apr 2007
                
                            
                            Symantec fixes 'high-risk' flaw in Enterprise Security Manager
Attackers could hijack machines from remote locations by exploiting a flaw in Symantec Enterprise Security Manager (ESM). Kaspersky Lab users also have a flaw to deal with. Continue Reading
By - 
                News
                05 Apr 2007
                
                            
                            Goldman Sachs: Interest in NetApp SAN products wanes
A survey by the investment firm shows enterprise storage buyers had a declining interest in NetApp SAN products over the last year. Continue Reading
By- Beth Pariseau, Senior News Writer
 
 - 
                News
                04 Apr 2007
                
                            
                            Storage vendors propose FC over Ethernet standard
A group of nine storage vendors led by Emulex is proposing a Fibre Channel over Ethernet (FCoE) standard . Continue Reading
By- Beth Pariseau, Senior News Writer
 
 - 
                News
                04 Apr 2007
                
                            
                            Data security breach at UCSF may have exposed thousands
The University of California at San Francisco (UCSF) acknowledged Wednesday that a security hole in a computer server may have exposed 46,000 people to potential identity fraud. Continue Reading
By - 
                Feature
                04 Apr 2007
                
                            
                            When disaster recovery and data classification collide
Attendees at a disaster recovery seminar discussed the complex application dependencies when disaster recovery and data classification combine. Continue Reading
By- Beth Pariseau, Senior News Writer
 
 - 
                Feature
                29 Mar 2007
                
                            
                            Will data breach be the end of TJX?
This week in Security Blog Log: Industry experts say companies can learn from a data breach and even prosper from it. But is TJX following the right example? Continue Reading
By- Senior News Writer Bill Brenner
 
 - 
                Feature
                27 Mar 2007
                
                            
                            IT pros eye Windows Server 2003 SP2 with caution
Despite its security and stability enhancements, IT pros say they are in no rush to deploy Windows Server 2003 SP2 Continue Reading
By - 
                News
                26 Mar 2007
                
                            
                            What are some of the best practices for managing the growth of unstructured data?
It starts with corporate policies around data management... Continue Reading
 - 
                News
                26 Mar 2007
                
                            
                            Web 2.0: CIOs want it their way
A new study found CIOs want Web 2.0 technology, but they're a little insecure about getting it from emerging specialized vendors. Continue Reading
By- Shamus McGillicuddy, Enterprise Management Associates
 
 - 
                News
                26 Mar 2007
                
                            
                            Metasploit Framework 3.0 released
Brief: Metasploit Framework 3.0 contains 177 exploits, 104 payloads, 17 encoders and 30 auxiliary modules that perform such tasks as host discovery and protocol fuzzing. Continue Reading
By- SearchSecurity.com Staff
 
 - 
                News
                26 Mar 2007
                
                            
                            How can a company set retention policies with such a glut of unstructured data?
It depends; there are no easy answers to this. There are a number of initiatives that a company should undertake, including disaster recovery, business continuity planning, Sarbanes-Oxley compliance and data security... Continue Reading
 - 
                News
                26 Mar 2007
                
                            
                            How is unstructured data affecting storage administrators and other staff?
There is absolutely an effect. Additional data volume translates into... Continue Reading
 - 
                News
                26 Mar 2007
                
                            
                            Are there regulatory compliance issues related to unstructured data?
The most important issue is legal discovery. You may not know what you have or how to find it, so it can be very difficult to find the files that may be required by a court of law... Continue Reading
 - News 26 Mar 2007
 - 
                News
                25 Mar 2007
                
                            
                            Microsoft investigates Windows Vista Mail flaw
Attackers could exploit a flaw in Windows Vista Mail to compromise PCs by tricking the user into opening a malicious email attachment. Microsoft is investigating. Continue Reading
By - 
                News
                22 Mar 2007
                
                            
                            Midrange storage array purchase considerations
A Buying Guide focusing on specific considerations for midrange disk array systems. Also find a series of specifications to help make on-the-spot product comparisons between v Continue Reading
 - 
                News
                22 Mar 2007
                
                            
                            Flaws haunt protocol tied to national infrastructure
Also: A weakness is found in Windows settings, Microsoft investigates a new Vista flaw, and flaws are addressed in OpenOffice.org and Firefox. Continue Reading
By- SearchSecurity.com Staff
 
 - 
                News
                22 Mar 2007
                
                            
                            Mozilla releases Firefox fix
One newly-discovered flaw and several glitches introduced in the last update have been fixed with Mozilla's release of Firefox 2.0.0.3 and 1.5.0.11. Continue Reading
By - 
                News
                22 Mar 2007
                
                            
                            Midrange storage array specifications
Product snapshots highlighting key specifications for a cross section of midrange storage array products. Continue Reading
 - 
                News
                21 Mar 2007
                
                            
                            Storage Security FAQ audiocast
Don't have time to dig into the FAQ text now? Download the audiocast in MP3 format and listen in the car, at the gym -- wherever you want. You can download the entire presentation or the individual questions that you are most interested in. Continue Reading
 - 
                Feature
                21 Mar 2007
                
                            
                            Symantec threat report under the microscope
This week in Security Blog Log: Infosec professionals dissect Symantec's latest threat report and express a range of views in the blogosphere. Continue Reading
 - 
                News
                21 Mar 2007
                
                            
                            Hackers broaden reach of cross-site scripting attacks
An explosion of AJAX-based applications has increased the damage that cross-site scripting (XSS) attacks can inflict on machines. A new tool uses XSS flaws to create a botnet. Continue Reading
 - 
                Feature
                21 Mar 2007
                
                            
                            Measuring Vista's true security muscle will take time
Researchers are digging through the Windows Vista code right now, and when they find flaws we'll hear about it. But it's the ones we don't hear about that should keep us up at night. Continue Reading
 - 
                News
                20 Mar 2007
                
                            
                            NAC panel says technology may not add up
A panel discussing the potential of using network access control (NAC) says the technology may not be worth the price of deploying and maintaining it. Continue Reading
By- Robert Westervelt, TechTarget
 
 - 
                News
                19 Mar 2007
                
                            
                            Internet complexity, insecurity could stifle innovation, expert says
Security threats are driving vendors to produce software and devices that automatically update and run only proprietary software with no effort from the end user. The result could be less flexibility and innovation, one expert says. Continue Reading
By- Robert Westervelt, TechTarget
 
 - 
                Feature
                18 Mar 2007
                
                            
                            Mobile data services development trends in 2007
Darrell Jordan-Smith takes a look at new data services architectures and development tools emerging in 2007 and the ongoing development efforts of the Java Community and others. Continue Reading
By- Darrell Jordan-Smith
 
 - 
                News
                18 Mar 2007
                
                            
                            Symantec: Data thieves thrive on zero-day flaws
According to Symantec's threat report for the second half of 2006, attackers exploited misplaced USB drives and zero-day flaws to steal vast amounts of data. Expect more of the same in 2007. Continue Reading
By - 
                News
                18 Mar 2007
                
                            
                            Hacker techniques use Google to unearth sensitive data
Those who know where to look could use Google to dig up all sorts of sensitive company information, including intellectual property and passwords, one security expert warns. Continue Reading
By - 
                News
                18 Mar 2007
                
                            
                            Cisco stamps on Brocade in Q4, Dell'Oro says
For the second quarter in a row Cisco is gaining SAN switch market share on Brocade, according to the latest report by the Dell'Oro Group. But the numbers are causing a firestorm. Continue Reading
By- Jo Maitland, TechTarget
 
 - 
                News
                15 Mar 2007
                
                            
                            Cisco buys WebEx for $3.2 billion
Cisco plans to buy WebEx, maker of hosted, on-demand collaboration applications. Continue Reading
By- Andrew R. Hickey, Senior News Writer
 
 - 
                Feature
                14 Mar 2007
                
                            
                            LexisNexis fights crime with storage
The document search company is offering a new data forensics service staffed by former federal agents and powered by commodity NAS. Continue Reading
By- Beth Pariseau, Senior News Writer
 
 - 
                News
                13 Mar 2007
                
                            
                            NEC reveals HydraStor grid storage
NEC announces its HydraStor array for secondary storage, touting its grid storage architecture, automated policies for data management and scalable deduplication. Continue Reading
By- Jo Maitland, TechTarget
 
 - 
                News
                13 Mar 2007
                
                            
                            What are some best practices for retaining data in a highly regulated business environment?
Have a good information retention policy. I see a lot of organizations where they retain backups or copies of databases, but they don't know why they're retaining it or for how long... Continue Reading
 - 
                News
                08 Mar 2007
                
                            
                            Review: eGuardPost a B+ overall
eGuardPost is a well-designed and highly capable product that meets an important need. It has strong security and great forensics capabilities. Continue Reading
By- Steven Weil, Point B
 
 - 
                News
                08 Mar 2007
                
                            
                            Review: Sun Java System Identity Manager 7.0 'impressive'
Hot Pick: Sun Java System Identity Manager 7.0 excels with agentless connectors, scalability and amazing auditing. Continue Reading
By - 
                News
                07 Mar 2007
                
                            
                            Symantec acquires automated risk assessment firm
Symantec has acquired Reston, Va.-based 4FrontSecurity, a maker of automated risk analysis and security management tools. An expert says it's the latest sign that the security risk assessment market is heating up. Continue Reading
By- Robert Westervelt, TechTarget
 
 - 
                News
                04 Mar 2007
                
                            
                            Buzz builds around data reduction for primary storage
Analysts predict that in-band compression offerings from StoreWiz, newly updated this week, are the first step toward a new wave of primary storage deduplication products. Continue Reading
By- Beth Pariseau, Senior News Writer
 
 - 
                News
                04 Mar 2007
                
                            
                            Expert: NAC not a network security cure-all
According to an expert at Black Hat DC, NAC success demands careful planning and a good understanding of the company network; otherwise, implementations can quickly go awry. Continue Reading
By- Robert Westervelt, TechTarget
 
 - 
                News
                02 Mar 2007
                
                            
                            Police force secures data with biometrics
Humberside Police has issued biometric USB drives among staff to maintain data security. Continue Reading
 - 
                News
                01 Mar 2007
                
                            
                            Linksys, Gateway launch low-end NAS
Cisco subsidiary Linksys and PC maker Gateway launch new NAS products for small businesses and consumers. Continue Reading
By- SearchStorage.com
 
 - 
                Feature
                28 Feb 2007
                
                            
                            PING with Mark Odiorne
Mark Odiorne, CISO at Scottish Re, provides insights on pen testing procedures, prioritising security for senior management and keeping compliant. Continue Reading
 - 
                News
                28 Feb 2007
                
                            
                            RFID cloning presentation moves forward despite legal threats
Chris Paget, director of research and development at IOActive spoke mainly about the science behind RFID tags and readers and the inherent security issues of the technology. Continue Reading
 - 
                Feature
                28 Feb 2007
                
                            
                            RFID dispute: Vendors still hostile toward full disclosure
Many vendors still believe that security by obscurity is still the best policy and make it a priority to silence vulnerability researchers. Continue Reading
 - 
                News
                27 Feb 2007
                
                            
                            McAfee fixes flaw in Mac antivirus software
Attackers could exploit the hole in McAfee's Virex 7.7 antivirus program for Mac OS X to bypass the malware scanner, but a fix is available. Continue Reading
By- SearchSecurity.com Staff
 
 - 
                News
                27 Feb 2007
                
                            
                            'Worm' targets Sun Solaris Telnet flaw
Security researchers have found evidence that a worm is trying to exploit the recently patched Telnet flaw in Sun Solaris. Experts say it's another reason to stay away from Telnet. Continue Reading
By - 
                News
                27 Feb 2007
                
                            
                            Wireless security: IT pros warily watching mobile phone threats
Security experts have warned repeatedly that mobile phone attacks will grow as the devices become more sophisticated. IT administrators are starting to believe them. Continue Reading
By - 
                News
                27 Feb 2007
                
                            
                            Black Hat presenter nixes RFID cloning demo under pressure
A demonstration of a device that could easily clone radio frequency identification (RFID) badges, was pulled from a conference presentation under pressure from a chip maker. Continue Reading
By- Robert Westervelt, TechTarget
 
 - 
                Feature
                26 Feb 2007
                
                            
                            Outsourced VoIP helps devastated company recover
Outsourced VoIP helped a Berkeley company keep up business as usual after a fire destroyed its offices. Continue Reading
By- Andrew R. Hickey, Senior News Writer
 
 - 
                News
                26 Feb 2007
                
                            
                            Sun scraps 6920 array, offloads support to HDS
The long-rumored deal that Sun will sell its 6920 virtualization array to HDS is done. But rather than developing the product, HDS will upgrade users to its TagmaStore instead. Continue Reading
By- Beth Pariseau, Senior News Writer
 
 - 
                Feature
                26 Feb 2007
                
                            
                            RFID privacy, security should start with design
Companies planning to deploy radio frequency identification technology (RFID) must demand that privacy and security issues are addressed early. Continue Reading
By- Robert Westervelt, TechTarget
 
 - 
                News
                26 Feb 2007
                
                            
                            Storm rages again: Self-morphing Trojan uses blogs to spread rootkits
A new variant of the Storm Trojan that changes with each download is infecting blog sites with malicious URLs, intercepting traffic when visitors try to post comments. Continue Reading
By - 
                News
                25 Feb 2007
                
                            
                            Storage switch startup burns out, turns to security
The company formerly known as Maxxan has been rechristened CipherMax and is now marketing a storage switch/encryption appliance with one point of management. Continue Reading
By- Beth Pariseau, Senior News Writer
 
 - 
                News
                25 Feb 2007
                
                            
                            HP announces iSCSI VTL for SMBs
HP's new iSCSI VTL devices include automated backup capabilities for users with fewer than four servers. Continue Reading
By- Beth Pariseau, Senior News Writer
 
 - 
                News
                25 Feb 2007
                
                            
                            PatchLink acquires STAT Guardian tool
PatchLink says it will add more muscle to its vulnerability management portfolio by acquiring the STAT Guardian tool from IT vendor Harris Corp. Continue Reading
By - 
                Feature
                22 Feb 2007
                
                            
                            Microsoft takes a blogosphere beating over Vista UAC
This week in Security Blog Log: Industry experts take Microsoft to task over a "very severe hole" in the design of Vista's User Account Controls (UAC) feature. Continue Reading
 - 
                News
                22 Feb 2007
                
                            
                            Google offers 10 GB inbox
The search engine giant is offering an email application on a subscription basis with five times the storage capacity of the free version. Continue Reading
By- SearchStorage.com Staff
 
 - 
                News
                21 Feb 2007
                
                            
                            Cisco warns of IP phone flaws
Attackers could circumvent security restrictions by exploiting flaws in certain Cisco IP phones, the networking giant warned Wednesday. Continue Reading
By - 
                Feature
                21 Feb 2007
                
                            
                            Data breach: If customers don't act, data will remain at risk
To make enterprises take data security seriously, customers must take control of their personally identifiable information and stop handing it out to businesses. Continue Reading
 - 
                News
                20 Feb 2007
                
                            
                            Cisco routers threatened by drive-by pharming
Millions of Cisco routers in circulation could be compromised by a newly-discovered attack technique Symantec calls drive-by pharming, the networking giant warned in an advisory. Continue Reading
By - 
                News
                20 Feb 2007
                
                            
                            Microsoft confirms new IE flaw
Attackers could exploit a new flaw in Internet Explorer (IE) to access local files on targeted systems, Microsoft confirmed Tuesday. Continue Reading
By - 
                News
                20 Feb 2007
                
                            
                            TJX data breach worse than initially feared
Hackers had access to a larger amount of customer data, TJX executives said in a statement. Continue Reading
 - 
                News
                19 Feb 2007
                
                            
                            Sourcefire fixes Snort flaw
Attackers could exploit a flaw in the popular open source Snort IDS tool to cause a denial of service or launch malicious code. Continue Reading
By - 
                News
                19 Feb 2007
                
                            
                            When security firms merge, some users are losers
Some users see their services improve when IT security vendors merge with other companies or get acquired. Others say they've been left out in the cold. Continue Reading
By - 
                News
                19 Feb 2007
                
                            
                            Quiz: Compliance improvement -- Get better as you go forward
A five-question multiple-choice quiz to test your understanding of the content presented by expert Richard Mackey in this lesson of SearchSecurity.com's Compliance School. Continue Reading
 - 
                Feature
                15 Feb 2007
                
                            
                            Questions fly as EMC Retrospect fades
All signs point to the end of life for EMC's Retrospect backup software for small businesses. Sources say the company cannot support an SMB software channel. Continue Reading
 - 
                News
                14 Feb 2007
                
                            
                            VoIP complexities stall implementation for SMBs
VoIP sales in the SMB market are predicted to lead revenue in the next several years, but most SMBs are confused by the number of different solutions. Continue Reading
By- Kate Dostart, Associate Editor
 
 
