IT strategy
IT strategy (information technology strategy) is a comprehensive plan that outlines how technology should be used to meet IT and business goals.. See complete definition.
- 
				Podcast
					04 Nov 2025
					
									
										
									
								HDD metrics and why mean time to failure is not terribly useful
In this podcast, we talk to Rainer Kaese of Toshiba about hard drive metrics, why MTTF is less useful than annualised failure rate, and why big systems need to use enterprise drives Continue Reading
By- Antony Adshead, Computer Weekly
 
 - 
				News
					04 Nov 2025
					
									
										
									
								UAE Sovereign Launchpad begins nationwide roll-out with support from e& and AWS
The cloud infrastructure platform aims to strengthen digital resilience and regulatory compliance across government and regulated sectors in the United Arab Emirates Continue Reading
By- Andrea Benito , Computer Weekly
 
 
- 
                News
                11 Dec 2006
                
                            
                            Storage Decisions Session Downloads: Executive Track (LV 2006)
Our "Executive track" sessions give C-level technology executivesan idea of where their storage should be and ideas on where it's headed. Continue Reading
 - 
                News
                11 Dec 2006
                
                            
                            Microsoft fixes two zero-day flaws
The December security update from Microsoft includes patches for zero-day flaws in Visual Studio and Windows Media Player, but two zero-day flaws in Word remain unfixed. Continue Reading
By - 
                Podcast
                11 Dec 2006
                
                            
                            Podcast: Mobile device threats are real, white-hat hacker says
Learn how easy it is for a hacker to gain access to a mobile device, whether employees are aware of security for their devices and why Bluetooth headsets should be turned off. Continue Reading
By- SearchSecurity.com Staff
 
 - 
                Feature
                11 Dec 2006
                
                            
                            Storage IPOs, brilliant or brainless
Just when we thought the fast and loose spending of the dot-com bubble was well behind us, a few recent storage company IPOs remind us that we really haven't gotten a lot smarter. Continue Reading
By- Steve Duplessie is the founder and senior analyst for the Enterprise Strategy Group
 
 - 
                News
                11 Dec 2006
                
                            
                            IT pros look for ways to lock down IM
Special Report: To control growing IM threats, administrators are trying to limit which programs can be used or ban the technology altogether. But that's not always possible. Continue Reading
By - 
                Feature
                11 Dec 2006
                
                            
                            Infrastructure security: Remote access DMZ
An excerpt from Chapter 7: Infrastructure security from "How to Cheat at Managing Information Security," by Mark Osborne. Continue Reading
 - 
                News
                11 Dec 2006
                
                            
                            Vendors to crank up SaaS offerings to SMBs next year
SMBs will outpace enterprises when it comes to IT spending in 2007 -- and vendors will delve deeper into SaaS to reach them. Continue Reading
By- Shamus McGillicuddy, Enterprise Management Associates
 
 - 
                News
                11 Dec 2006
                
                            
                            SIP desktop phone blends functionality, style
VoIP desktop phones are no longer the clunky hunks of plastic that take up space on your desk. Siemens yesterday launched a new family of SIP phones that are as slick as they are functional. Continue Reading
By- Andrew R. Hickey, Senior News Writer
 
 - 
                News
                10 Dec 2006
                
                            
                            Zantaz buys data classification partner Singlecast
Email archiving player Zantaz has purchased data classification startup Singlecast, which can categorise and apply policies to data before an email takes up storage space. Continue Reading
By- Beth Pariseau, Senior News Writer
 
 - 
                News
                10 Dec 2006
                
                            
                            Microsoft suffers third zero-day in a week
A second zero-day flaw in Word has been uncovered, Microsoft said Sunday. It's the software giant's third zero-day in a week. Continue Reading
By - 
                News
                10 Dec 2006
                
                            
                            Storage Decisions in the wild, wild west
Dedupe, iSCSI, backup, virtualisation and cowboys in Stetson hats -- Storage Decisions Las Vegas 2006 had it all. Continue Reading
By- SearchStorage.com Staff
 
 - 
                News
                09 Dec 2006
                
                            
                            Storage IQ: Key technologies for 2006
We keep a close eye on what technologies our readers are most interested in. Here are the year's 25 most commonly searched terms. Do you know them all? Continue Reading
 - 
                Feature
                07 Dec 2006
                
                            
                            Zero-day tracker a hit, but IT shops need better strategy
This week in Security Blog Log: Reaction to eEye's new zero-day tracker is positive, but some experts say it won't help unless IT shops have a layered defense to start with. Continue Reading
 - 
                News
                07 Dec 2006
                
                            
                            Dell, Microsoft tout joint NAS product
The new NX1950 product is vastly more expensive than its counterparts from HP and NetApp, but it scales higher, supports clusters and has redundant controllers. Continue Reading
By- Beth Pariseau, Senior News Writer
 
 - 
                News
                06 Dec 2006
                
                            
                            Microsoft to fix Visual Studio, Windows flaws
Microsoft plans to release five security updates to address vulnerabilities in Windows and a flaw in Visual Studio as part of its monthly security bulletin release cycle. Continue Reading
By - 
                News
                06 Dec 2006
                
                            
                            MP3 search site pushes spyware, watchdogs say
A Web site that gives users the ability to search for MP3s contains programs that behave like spyware, according to the Center for Democracy and Technology and StopBadware.org. Continue Reading
By - 
                News
                04 Dec 2006
                
                            
                            IBM to acquire compliance software firm
IBM plans to acquire Consul Risk Management Inc., a Delft, Netherlands-based firm whose software tracks non-compliant behavior of employees. Continue Reading
By- Robert Westervelt, TechTarget
 
 - 
                News
                03 Dec 2006
                
                            
                            Security Bytes: Phishing worm spreads through MySpace
Round up of security news Continue Reading
By- SearchSecurity.com Staff
 
 - 
                News
                30 Nov 2006
                
                            
                            Terrorists may target financial sites
The U.S. government is warning of an al-Qaida call for a cyberattack against online stock trading and banking Web sites Continue Reading
By- SearchSecurity.com Staff
 
 - 
                News
                30 Nov 2006
                
                            
                            Symantec blames piracy for Veritas licensing snafu
Weekly compilation of storage news: Symantec says that software counterfeiting is throwing a wrench in tech support ; FRCP rules take effect. Continue Reading
By- SearchStorage.com Editors
 
 - 
                News
                30 Nov 2006
                
                            
                            Oracle responds to security critics
Security Blog Log: Oracle takes on researchers who have criticised its security procedures in recent weeks. Meanwhile, Symantec warns of new zombie malware. Continue Reading
 - 
                News
                29 Nov 2006
                
                            
                            Multiple flaws in Adobe Reader, Acrobat
Multiple flaws in Adobe Reader and Acrobat could allow attackers to execute malicious commands on victims' computers. Continue Reading
By - 
                News
                28 Nov 2006
                
                            
                            Symantec fixes NetBackup Puredisk flaw
An unauthorised user could launch malicious code by exploiting a flaw in Symantec's Veritas NetBackup PureDisk product. But a fix is available. Continue Reading
By - 
                News
                28 Nov 2006
                
                            
                            Adware targets Mac OS X
As F-Secure notes what may be the first example of adware designed for Macs, researcher LMH reports more flaws in the operating system as part of the Month of Kernel Bugs. Continue Reading
By - 
                Feature
                26 Nov 2006
                
                            
                            Managed and hosted VoIP: muddling through
For companies looking for an alternative to a premise-based phone system, there are plenty available, and they come in all shapes and sizes. Get a clearer understanding of exactly what's available so you can ask the right questions to get the managed or hosted service your firm needs. Continue Reading
By- Zeus Kerravala, ZK Research
 
 - 
                Feature
                26 Nov 2006
                
                            
                            Recordless email: magical or menacing?
A new startup promises recordless email. Is this a stroke of genius that will reward the company with billions of Internet bucks, or is it the end of the world as we know it? Continue Reading
 - 
                News
                22 Nov 2006
                
                            
                            Zango defying FTC agreement, researchers say
This week in Security Blog Log: Two researchers accuse Zango of unsavory adware tactics, despite the company's pledge to clean up its act. Continue Reading
 - 
                News
                21 Nov 2006
                
                            
                            New Mac OS X flaw exposed
A Mac OS X flaw was exposed as part of the Month of Kernel Bugs. Also, a new Web site vows to follow the lead of researchers LMH and H.D. Moore with a week of Oracle zero-days. Continue Reading
By - 
                News
                21 Nov 2006
                
                            
                            BakBone brushes up replication software
BakBone's NetVault Replicator version 5.0 includes automatic configuration of replication for remote sites, a capacity planning tool and a higher performance data movement engine. Continue Reading
By- Beth Pariseau, Senior News Writer
 
 - 
                Feature
                09 Nov 2006
                
                            
                            Security Blog Log: Sailing a sea of spam
This week, bloggers struggle to purge their bloated inboxes. Their experiences lend weight to recent studies showing a breathtaking spike in spam. Continue Reading
 - 
                Podcast
                09 Nov 2006
                
                            
                            Podcast: Tor peer-to-peer privacy could be hacked
In this edition of Security Wire Weekly, Andrew Christensen of FortConsult explains how the Tor peer-to-peer network can be hacked to track down user identities. Continue Reading
By- SearchSecurity.com Staff
 
 - 
                News
                08 Nov 2006
                
                            
                            Storage virtualization acquisitions need careful consideration
Storage virtualization alleviates traditional storage growth problems by implementing a layer of abstraction between applications and physical storage, allowing storage to be combined and treated as a ubiquitous resource, regardless of location. This buying guide helps you understand the most important considerations involved in storage virtualization product selection, identifies specific points of interest for software, hardware and VSAN product categories, and presents a series of basic product specifications that will start you pick the best product for your organization. Continue Reading
 - 
                News
                07 Nov 2006
                
                            
                            Big pay for storage jobs, page 6
Find out what other storage professionals are being paid in this year's salary survey. Continue Reading
 - 
                News
                07 Nov 2006
                
                            
                            Big pay for storage jobs, page 3
Find out what other storage professionals are being paid in this year's salary survey. Continue Reading
 - 
                News
                07 Nov 2006
                
                            
                            Big pay for storage jobs, page 7
Find out what other storage professionals are being paid in this year's salary survey. Continue Reading
 - 
                News
                07 Nov 2006
                
                            
                            Big pay for storage jobs
Find out what other storage professionals are being paid in this year's salary survey. Continue Reading
 - 
                News
                07 Nov 2006
                
                            
                            Big pay for storage jobs, page 4
Find out what other storage professionals are being paid in this year's salary survey. Continue Reading
 - 
                News
                07 Nov 2006
                
                            
                            Big pay for storage jobs, page 5
Find out what other storage professionals are being paid in this year's salary survey. Continue Reading
 - 
                News
                07 Nov 2006
                
                            
                            Mozilla fixes Firefox flaws
Attackers could exploit multiple flaws in Firefox, SeaMonkey and Thunderbird to crash machines, bypass security restrictions and launch malicious code. Continue Reading
By - 
                News
                07 Nov 2006
                
                            
                            Big pay for storage jobs, page 2
Find out what other storage professionals are being paid in this year's salary survey. Continue Reading
 - 
                News
                06 Nov 2006
                
                            
                            How to manage encryption keys
Encryption is an effective way to secure data, but the encryption keys used must be carefully managed to ensure data remains protected and accessible when needed. Continue Reading
 - 
                Feature
                02 Nov 2006
                
                            
                            Security Blog Log: Dissecting Firefox 2.0
This week, bloggers examine the security features of Firefox 2.0 and come away with mixed reviews. Does it fare better than Internet Explorer 7? Continue Reading
 - 
                Feature
                02 Nov 2006
                
                            
                            Review: Arbor Networks' Peakflow X 3.6
Hot Pick: Peakflow isn't cheap and requires an intimate understanding of data flows, applications and network infrastructure. But the investment will pay dividends. Continue Reading
By- Sandra K. Miller, Contributing Writer
 
 - 
                Feature
                02 Nov 2006
                
                            
                            Review: Network Intelligence's enVision
enVision offers excellent value and is highly configurable, though typically that means you have to put a lot into it to get the most out of it. Continue Reading
By- Brent Huston, Contributing Writer
 
 - 
                Feature
                01 Nov 2006
                
                            
                            Download Advanced Storage Guide Chapter 2: Backup/Data protection (PDF)
A printable version of our Advanced Storage All-In-One Guide. Download Chapter 2: Backup/Data protection in .pdf format now. Continue Reading
 - 
                Feature
                01 Nov 2006
                
                            
                            VoIP convergence: Managing staffing issues
Companies making the transition to IP telephony must find a way to converge their voice and data networks -- and the employees who work on them. Continue Reading
By- Amy Kucharik, TechTarget
 
 - 
                News
                31 Oct 2006
                
                            
                            Flaw found in Firefox 2.0
Attackers could exploit the security flaw to crash versions 1.5.0.7 and 2.0 of the browser, according to various security advisories. Continue Reading
By - 
                Podcast
                31 Oct 2006
                
                            
                            Podcast: The state of Oracle security
In this edition of Security Wire Weekly, Oracle DBA Jon Emmons gives his observations about Oracle's new critical patch update format. Continue Reading
By- SearchSecurity.com Staff
 
 - 
                News
                31 Oct 2006
                
                            
                            E-vaulting's many faces can confuse IT efforts
E-vaulting is the process that describes how enterprise IT departments ship backup tapes and replicate data to remote disk arrays and VTLs. E-vaulting is not a new concept, but more recently it has grown to mean remote backups and replication for SMBs/SMEs using third-party services. This article examines e-vaulting, highlights the major considerations and roadblocks in implementation, examines the impact of e-vaulting on real-life users and looks ahead at future e-vaulting trends. Continue Reading
 - 
                News
                30 Oct 2006
                
                            
                            Messaging Security School
SearchSecurity.com's Messaging Security School has brought together some of the most knowledgeable experts in the messaging security field to offer you personal instruction on how to secure the information handled by your organization's knowledge workers. Continue Reading
 - 
                News
                26 Oct 2006
                
                            
                            Achieving compliance: a real-world roadmap
A security manager's responsibilities extend beyond the technical aspects of the job. These days, effective governance and compliance are just as essential. Continue Reading
 - 
                News
                26 Oct 2006
                
                            
                            Security Blog Log: The never-ending PatchGuard debate
This week, security vendor fright over the Windows Vista PatchGuard feature permeates the blogosphere. Is Microsoft the boogeyman, or just misunderstood? Continue Reading
 - 
                News
                23 Oct 2006
                
                            
                            What storage managers are buying and why, page 3
What storage managers are buying and why Continue Reading
 - News 23 Oct 2006
 - 
                Feature
                23 Oct 2006
                
                            
                            What storage managers are buying and why, page 4
What storage managers are buying and why Continue Reading
 - 
                News
                23 Oct 2006
                
                            
                            What storage managers are buying and why, page 6
What storage managers are buying and why Continue Reading
 - 
                News
                23 Oct 2006
                
                            
                            IT executives eager to exploit Web 2.0 wave
What good is a blog if no one reads it? IT managers find out and begin to make blogging and other Web 2.0 tools a more strategic part of their business. Continue Reading
By- Shamus McGillicuddy, Enterprise Management Associates
 
 - 
                News
                22 Oct 2006
                
                            
                            Enhanced Identity and Access Management
From consolidating directories to automating provisioning and rolling out single sign-on, these sessions identify how leading organizations are strengthening authorization and enforcing access controls. Continue Reading
 - 
                News
                22 Oct 2006
                
                            
                            Snyder On Security: An insider's guide to the essentials
Joel Snyder, senior partner with consultancy Opus One, provides an in-depth look at information security trends and technologies. Continue Reading
 - 
                News
                18 Oct 2006
                
                            
                            Rural Payments Agency project failed after IT system costs spiralled
Delays in implementing a bespoke IT system led to the Rural Payments Agency (RPA) failing to pay subsidies to farmers on time, according to a National Audit Office report. Continue Reading
 - 
                Feature
                16 Oct 2006
                
                            
                            Strategy clinic: Deciding which activities to measure to provide meaningful insights
I have always believed in 'doing' rather than self-monitoring, but reluctantly agree that the IT department needs to provide meaningful metrics on its activities. We have no shortage of things to measure, but how do we decide which are the most effective use of our time and energy? Continue Reading
 - 
                News
                16 Oct 2006
                
                            
                            Ray Noorda, the pioneer behind rise of Novell, dies
Network computing pioneer and former Novell chief executive Ray Noorda has died aged 82. Continue Reading
By - 
                Feature
                16 Oct 2006
                
                            
                            Nmap Technical Manual
By now, most infosec pros have heard of Nmap, and most would agree that even though the popular freeware tool is invaluable, installing, configuring and running it in the enterprise is no easy task. With that in mind, SearchSecurity.com, in collaboration with security expert Michael Cobb, has produced an Nmap Tutorial, detailing how this free tool can help make your organization more secure. Continue Reading
 - 
                Feature
                12 Oct 2006
                
                            
                            Security Blog Log: Taking Google Code Search for a spin
This week, the blogosphere is buzzing about Google Code Search. Despite concerns that the tool will aid attackers, some see it as a boost for security. Continue Reading
 - 
                News
                09 Oct 2006
                
                            
                            Banking on the future
As the banking landscape changes and global competition takes hold, IT offers banks a way of differentiating themselves from the competition, so how do they balance innovation and imitation in this tough market sector? Continue Reading
 - 
                News
                04 Oct 2006
                
                            
                            Tiered storage becoming tried and true
Tiered storage matches the value of data with the performance (and expense) of storage. Ideally, tiered storage can save money, while easing the access demands to any single storage tier. While tiered storage has clearly brought storage costs and performance into focus, it has yet to reach its full potential in the enterprise. Continue Reading
 - 
                Feature
                03 Oct 2006
                
                            
                            School district expels outsourced backup, enrolls CDP
Revere School District dumps tape and outsourced backup, and deploys SonicWall's continuous data protection product. Continue Reading
By- Alex Barrett, News Director, Data Center Media Group
 
 - 
                Feature
                03 Oct 2006
                
                            
                            Test your IQ: Business continuity -- ANSWER
This type of plan specifies a means of maintaining essential services at the crisis location. Continue Reading
 - 
                News
                03 Oct 2006
                
                            
                            Alliance and Leicester to overhaul core systems
Alliance & Leicester has announced plans replace many of its core banking systems with Accenture’s Alnova Financial Solutions banking platform under a three-year IT-led business transformation programme. Continue Reading
 - Feature 02 Oct 2006
 - 
                Feature
                02 Oct 2006
                
                            
                            ZERT rekindles third-party patching debate
This week in Security Blog Log: IT security pros express more reservations about third-party patching, including the CEO of a company that released one a few months ago. Continue Reading
 - 
                Feature
                30 Sep 2006
                
                            
                            PING with Suzanne Hall
In this exclusive interview with Information Security magazine, Suzanne Hall, AARP director of IT operations and security, examines how security professionals can enable telecommuters and mobile workers while keeping their data secure. Continue Reading
 - 
                News
                28 Sep 2006
                
                            
                            Top tech tips from SearchStorage.com
Check out the top tips on backup, SAN, NAS and storage management from SearchStorage.com. Continue Reading
 - 
                Feature
                27 Sep 2006
                
                            
                            On privacy laws, every state is one of confusion
It's getting increasingly difficult for US firms to comply with regulations . David A. Meunier feels that it's time to develop safeguards and processes for this ever-changing regulatory environment. Continue Reading
By- David A. Meunier
 
 - 
                News
                26 Sep 2006
                
                            
                            Stration worm targets Windows machines
The worm uses several fake email messages, including one claiming to be a security update. Users are advised to avoid unsolicited email attachments. Continue Reading
By - 
                News
                24 Sep 2006
                
                            
                            Hijacked consumer machines target the enterprise
Attackers continue to strike gold by targeting consumers who lack the security savvy to address desktop application flaws, according to Symantec Corp. Enterprises ultimately pay the price. Continue Reading
By - 
                Feature
                24 Sep 2006
                
                            
                            NetApp operations chief talks growth
Tom Georgens, executive vice president and general manager at NetApp -- also rumoured to be in the running as next CEO -- discusses what's driving its growth. Continue Reading
By- Jo Maitland, TechTarget
 
 - 
                News
                14 Sep 2006
                
                            
                            Secure network perimeter to result from Symantec-Juniper deal
Juniper and Symantec announced a deal to integrate Symantec's client security software with Juniper's security hardware. The result will allow endpoint compliance and access control platforms to secure the enterprise perimeter. Continue Reading
By- Amanda Mitchell, News Editor
 
 - 
                News
                14 Sep 2006
                
                            
                            Three ways to create clustered storage, page 3
Clustered storage systems run on storage servers, NAS gateways and hosts. Here's how to determine which clustered file-system architecture is best for your needs and storage environment. Continue Reading
 - 
                News
                14 Sep 2006
                
                            
                            Three ways to create clustered storage
Clustered storage systems run on storage servers, NAS gateways and hosts. Here's how to determine which clustered file-system architecture is best for your needs and storage environment. Continue Reading
 - 
                News
                12 Sep 2006
                
                            
                            Dell and EMC: Five more years
Dell leans on EMC for support in the face of an SEC investigation and possible delisting from NASDAQ. Continue Reading
By- Alex Barrett, News Director, Datacenter Media Group
 
 - 
                News
                12 Sep 2006
                
                            
                            Big security fixes for QuickTime, Flash Player
Apple and Adobe warned that attackers could exploit multiple flaws in QuickTime and Flash Player to run malicious code on targeted machines. Continue Reading
By - 
                News
                11 Sep 2006
                
                            
                            VoIP still a confusing area for SMBs
A study released at today's VON conference in Boston suggests that SMBs -- despite their growing use of VoIP -- are still confused about VoIP technology. Continue Reading
By- Andrew R. Hickey, News Writer
 
 - 
                News
                11 Sep 2006
                
                            
                            Data storage compliance's impact on storage product choices
Data storage compliance is having a tremendous impact on the storage organization, as well as the management practices employed to retain, search, certify and destroy data. It's not just regulations like SOX or HIPAA that influence storage -- there are well over 10,000 regulations that affect data storage, backup and protection across a range of industries. But companies are often left alone in their quest to identify the regulations that relate to them, identify what data should be saved and implement storage to meet those regulations. This article covers the essential goals of data storage compliance, examines implementation considerations and obstacles and reviews the impact of compliance on storage. Continue Reading
 - 
                News
                11 Sep 2006
                
                            
                            Security Bytes: Hackers target the Terminator
In other news, Symantec upgrades its Norton product line and the Anti-Phishing Working Group says phishing activity soared this summer. Continue Reading
By- SearchSecurity.com Staff
 
 - 
                Feature
                10 Sep 2006
                
                            
                            Storage upstarts are tipping the vendor scales
The big storage vendors are always trying to steal a piece of each other's pie. But some small tech upstarts might play big parts in determining who comes out on top. Continue Reading
 - News 06 Sep 2006
 - 
                News
                06 Sep 2006
                
                            
                            VoIP startup untethers would-be mobile workers from wireline office phones
VoIP startup DiVitas Networks has voice-over-WiFi-to-cellular technology in the works that gives endusers access to enterprise apps and puts dual-mode handset management in the hands of network administrators. Continue Reading
By- Amanda Mitchell, News Editor
 
 - 
                News
                06 Sep 2006
                
                            
                            Security Bytes: New flaw in Cisco IOS
Security news including Cisco, Mozilla hires a former Microsoft strategist to bolster security, a new "pump-and-dump" stock spam campaign is discovered and TippingPoint lists info on new flaws. Continue Reading
By- SearchSecurity.com Staff
 
 - 
                Feature
                06 Sep 2006
                
                            
                            Security Blog Log: Word doc scam evades spam filters
Also this week: A researcher gets a harsh reward after flagging a University of Southern California Web site flaw, and more blogs are keeping an eye on the latest security breaches. Continue Reading
 - 
                News
                05 Sep 2006
                
                            
                            ControlGuard targets rogue devices
ControlGuard Access Manager is an effective tool for controlling what devices users can add to their workstations and how they are used. Continue Reading
By- Harris Weisman, Contributing Writer
 
 - 
                News
                05 Sep 2006
                
                            
                            Proofpoint delivers strong messaging security
Proofpoint Messaging Security Gateway is a highly recommended, affordable solution for big enterprises that need protection from email-based attacks. Continue Reading
By- Phoram Mehta, Contributing Writer
 
 - 
                News
                05 Sep 2006
                
                            
                            VoIP outsourcing: Save money and gain flexibility
VoIP outsourcing is the way to go for organisations looking to deploy voice services quickly and flexibly without a major investment in skills and upkeep. Continue Reading
By- Amanda Mitchell, News Editor
 
 - 
                News
                04 Sep 2006
                
                            
                            Revamped Cisco WAFS worth the wait, users say
Months late, Cisco has finally released a combined Wan optimisation and WAFS product, while startups like Riverbed have been snapping up the customers. But some Cisco beta testers say it has been worth the wait. Continue Reading
By- Beth Pariseau, Senior News Writer
 
 - 
                Feature
                04 Sep 2006
                
                            
                            Protecting wireless networks: Step 3
Security testing expert Kevin Beaver covers the tools and techniques needed to find and exploit insecure wireless networks. Continue Reading
 - 
                Feature
                04 Sep 2006
                
                            
                            Protecting wireless networks: Step 2
Security testing expert Kevin Beaver covers the tools and techniques you'll need to find and exploit insecure wireless networks. Continue Reading
 - 
                Feature
                04 Sep 2006
                
                            
                            Wireless network security testing
Attack your own wireless networks to find vulnerabilities before malicious hackers do. Continue Reading
 - 
                News
                31 Aug 2006
                
                            
                            Attacks against MS06-040 on the rise
Six pieces of malware are now going after the Windows Server Service flaw outlined in MS06-040, and a spike in attacks has led Symantec to raise its ThreatCon to Level 2. Continue Reading
By - 
                News
                31 Aug 2006
                
                            
                            Emulex acquisition could cloud future of FC-SATA spec
New Emulex subsidiary Sierra Logic's strength is in FC-SATA bridging technology. Meanwhile, ONStor launches midrange clustered NAS, and Quantum shareholders withhold votes. Continue Reading
By- Beth Pariseau, Senior News Writer
 
 - 
                Feature
                31 Aug 2006
                
                            
                            Identity and Access Management Security School
This Security School explores critical topics related to helping security practitioners establish and maintain an effective identity and access management plan. Continue Reading
 
