Archive
Browse the full archive of Computer Weekly online content - see our most recent articles listed below, or browse by year of publication.
2006 Stories
-
August 15, 2006
15Aug2006
News
Cisco boosts VoIP certification
The upgraded CCNP midlevel Cisco certification now incorporates VoIP, security and wireless to boost converged network skills among enterprise professionals. Continue Reading
-
August 15, 2006
15Aug2006
News
Qualcomm to halve storage growth in 2007
Wireless chipmaker Qualcomm expects to slow down its storage growth by at least 50% next year using a capacity utilisation tool from MonoSphere. Continue Reading
-
August 14, 2006
14Aug2006
News
EMC sheds light on RSA integration plans
As the dust begins to settle on EMC's $2.1 billion acquisition of RSA Security, the hard work of integration begins. What's EMC strategy here? Continue Reading
-
August 14, 2006
14Aug2006
News
Mocbot update targets MS06-040 flaw
Security experts raised the red flag Sunday as new malware targets the Windows flaw addressed in the MS06-040 patch. Attackers are using the flaw to expand IRC-controlled botnets. Continue Reading
-
August 14, 2006
14Aug2006
News
Wireless security boost for laptops outside the office
>Most companies do a pretty good job with wireless security within the office walls, but what happens when end users take their laptops home -- or to Starbucks? Continue Reading
-
August 10, 2006
10Aug2006
News
Security Blog Log: Israeli-Hezbollah war spills into cyberspace
This week blogosphere warily watches online attacks inspired by the Mideast conflict and rants over the latest security incidents at AOL and the VA. Continue Reading
-
August 10, 2006
10Aug2006
News
Vista kernel limits have security vendors on edge
Microsoft's PatchGuard feature will prevent extension of Windows Vista kernel, and antivirus vendors say it'll make it harder for them to produce good security products. Continue Reading
-
August 10, 2006
10Aug2006
News
Symantec fixes Backup Exec flaw
Attackers could exploit flaws in Symantec Backup Exec 9.1 and 9.2 for NetWare Servers to cause a denial of service, launch malicious code and gain access to vulnerable machines. Continue Reading
-
August 09, 2006
09Aug2006
News
Xiotech resurfaces with data compliance focus
Xiotech has been busy acquiring a legal discovery software vendor and building a data compliance practice, but what about storage? Continue Reading
-
August 08, 2006
08Aug2006
News
Cheat sheet: Access management solutions and their pros and cons
Popular authentication methods such as passwords, biometrics and two-factor are assessed in this chart. Continue Reading
-
August 08, 2006
08Aug2006
News
Users cautious about Brocade-McData merger
Customers are worried about McData switches interoperating with other products and how Brocade will handle product overlap. Continue Reading
-
August 08, 2006
08Aug2006
In Depth
IT bosses preparing for Byte Night
About 250 senior IT professionals will take part in the annual Byte Night charity sleep-out on London’s Embankment on 22 September in an effort to raise £300,000 to combat child homelessness. Continue Reading
-
August 07, 2006
07Aug2006
In Depth
Inside MSRC: Time to rethink security workarounds
Christopher Budd of the Microsoft Security Response Center recommends implementing one of several security workarounds to ensure a secure infrastructure until this month's most important Windows update can be installed. Continue Reading
-
August 06, 2006
06Aug2006
News
Security Bytes: CA fixes eTrust Antivirus flaws
Online thieves steal $700,000 from personal accounts, researchers expose e-passport vulnerability; and arrests are made in the VA security breach case. Continue Reading
-
August 06, 2006
06Aug2006
News
VoIP call quality on the decline
Advances in technology have made VoIP more common, but that hasn't stopped VoIP call quality from dropping steadily over the last 18 months, according to a recent study by Brix Networks. Continue Reading
-
August 03, 2006
03Aug2006
News
Ajax threats worry researchers
Black Hat: While it makes smooth Web applications like Google Maps possible, the rush to adopt Ajax may fuel haphazard development and a feeding frenzy among hackers. Continue Reading
-
August 03, 2006
03Aug2006
News
Vendors reject preferential knowledge sharing
While Cisco continues to investigate a potential PIX firewall flaw, it and other vendors say sharing security information quickly and indiscriminately is always the best policy. Continue Reading
-
August 03, 2006
03Aug2006
News
EMC updates SAN Advisor design tool
EMC's SAN design tool now recognises zones and allows users to customise rules; HP and EMC sign five-year cross-licensing deal. Continue Reading
-
August 03, 2006
03Aug2006
In Depth
Countering attackers with NAC, IPS
Product review: Information Security magazine's Wayne Rash says ForeScout Technologies' flexible CounterACT appliance combines NAC with IPS and is worth the investment. Continue Reading
-
August 03, 2006
03Aug2006
In Depth
Akonix A-Series offers complex, best-of-breed IM security
Product review: Information Security magazine's Sandra Kay Miller says The Akonix A-Series instant messaging security appliances works well but needs better documentation. Continue Reading
-
August 03, 2006
03Aug2006
In Depth
Thwarting IM management challenges
Product review: Information Security magazine's Sandra Kay Miller says Symantec's IM Manager 8.0 has limited public network features, but offers excellent reporting Continue Reading
-
August 03, 2006
03Aug2006
In Depth
Security event management, no strings attached
Product review: Information Security magazine's Joel Snyder says Check Point's vendor-agnostic Eventia Analyzer 2.0/Eventia Reporter is worth consideration despite limited BI options. Continue Reading
-
August 02, 2006
02Aug2006
News
Twelve Microsoft fixes coming on Patch Tuesday
Microsoft Tuesday will release a dozen new security bulletins for its Windows and Office products, likely including fixes for several outstanding PowerPoint flaws. Continue Reading
-
August 02, 2006
02Aug2006
News
Mobile security begins with policy
Mobile security can no longer be an afterthought. Mobile experts say security starts, but doesn't end, with policy. Continue Reading
-
August 02, 2006
02Aug2006
News
RFID security issues are cause for corporate concern
Although small in nature, RFID tags could be used to attack databases and corrupt critical information. It's a growing concern as corporate RFID use skyrockets, yet experts say there are reasonable ways to mitigate the risks and gain the business ... Continue Reading
-
August 02, 2006
02Aug2006
News
Possible Cisco zero-day exploit revealed at Black Hat
Details of an alleged flaw related to SIP and PIX appliances, briefly mentioned in a Wednesday Black Hat presentation, are being kept under wraps as Cisco and US-CERT investigate. Continue Reading
-
August 02, 2006
02Aug2006
News
SRM tools improve storage planning and deployment
Why are storage administrators struggling to identify their storage resources and utilise those resources to their best potential? Continue Reading
-
August 02, 2006
02Aug2006
In Depth
Are smaller companies storage-stupid?
Storage guru Jon Toigo questions the buying process of storage in SMBs . Continue Reading
-
August 02, 2006
02Aug2006
News
SRM tools improve storage planning and deployment, page 2
Storage administrators are struggling to identify their storage resources and utilise those resources to their best potential Continue Reading
-
August 01, 2006
01Aug2006
News
Arun Taneja: Blogs and more
Monthly blogs by Arun Taneja, as well as other material by this storage expert. Continue Reading
-
August 01, 2006
01Aug2006
In Depth
Endpoint security quiz answers
The answers to the Endpoint quiz Continue Reading
-
August 01, 2006
01Aug2006
News
Security Bytes: Exploits targeting freshly patched Apple flaw
Apple patches nearly two dozen holes in OS X, but not before exploits are unleashed. Plus McAfee fixes a critical flaw and EMC gets the OK to buy RSA. Continue Reading
-
August 01, 2006
01Aug2006
News
Litchfield: Database security is 'IT's biggest problem'
At Black Hat USA 2006, database security guru David Litchfield unveils 20-plus IBM Informix flaws that attackers could exploit to create malicious files, gain DBA-level privileges and access sensitive data. Continue Reading
-
August 01, 2006
01Aug2006
In Depth
Web services represent security's next battlefront
The evolution and mainstream use of Web services has placed the nascent technology in the crosshairs of attackers, and one firm in particular says it can mitigate the threats. Continue Reading
-
August 01, 2006
01Aug2006
In Depth
PING with Heidi Kujawa
Heidi Kujawa, director of enterprise architecture services for Sony Pictures Entertainment, explains how combatting piracy takes more than just keeping bootleggers out of the theatres Continue Reading
-
July 31, 2006
31Jul2006
News
Security Bytes: ISS warns of new Microsoft Windows flaw
Attackers could exploit the latest Microsoft Windows flaw to crash vulnerable machines and Symantec fixes a Brightmail AntiSpam flaw. Continue Reading
-
July 31, 2006
31Jul2006
In Depth
Beyond HIPAA and GLBA
Most firms are familiar with HIPAA, Gramm-Leach-Bliley and Sarbanes-Oxley, but newer regulations are pushing certain industry sectors to adopt strong authentication Continue Reading
-
July 31, 2006
31Jul2006
News
Real life experiences: Lessons learned in disaster recovery planning
Debbie Schwartz shares the lessons she has learned in keeping disaster recovery implementations up-to-date with new and changing business needs. Continue Reading
-
July 30, 2006
30Jul2006
News
EqualLogic updates storage provisioning software
Users have more options when it comes to pooling storage with version 3.0 of EqualLogic's array software, but some are wondering whatever happened to the SAS disks. Continue Reading
-
July 27, 2006
27Jul2006
News
ITIL framework finds new stakeholders with v3
Too many companies today don't have an accurate count of their assets, and therefore are underutilizing systems and being unproductive. A CMDB framework, used in support with an ITIL project, can provide databases and analysis tools to help IT ... Continue Reading
-
July 26, 2006
26Jul2006
News
Mozilla issues critical security updates
New patches to fix 13 software security flaws, eight of which have been deemed critical. Continue Reading
-
July 26, 2006
26Jul2006
In Depth
Automated provisioning quiz answers
the key questions answered Continue Reading
-
July 26, 2006
26Jul2006
News
DHS puts Zitz in charge of cybersecurity division
American career intelligence officer Robert S. Zitz has taken over day-to-day operations of the US National Cyber Security Division, but his department still has numerous digital defence problems to remedy. Continue Reading
-
July 26, 2006
26Jul2006
News
Blue Cross bears burden of 'no wireless' policy
Blue Cross of Idaho had a "no wireless" policy on paper but never really enforced it. That is, until a team of auditors said the company had better do something. Continue Reading
-
July 26, 2006
26Jul2006
In Depth
Authenticating Windows
Three options for Windows authentication with eSSO clients. Continue Reading
-
July 25, 2006
25Jul2006
News
Employee monitoring should be done with care
Employee monitoring is on the rise as firms try to safeguard their sensitive information and increase productivity. Continue Reading
-
July 25, 2006
25Jul2006
News
Netscape.com hit with cross-site scripting attack
The popular Web portal was hit by a cross-site scripting attack early on 26 July but Netscape says the problem has been addressed Continue Reading
-
July 25, 2006
25Jul2006
News
Longhorn on the road to Linux compatibility
The next version of Windows Server – codenamed Longhorn – will include virtualisation technology that is interoperable with the open source Linux operating system. Continue Reading
-
July 24, 2006
24Jul2006
News
Security Bytes: New Microsoft exploits in the wild
The exploits target issues Microsoft patched earlier this month. Meanwhile, flaws are reported in Oracle for OpenView and a Mozilla Firefox keystroke logger is on the loose. Continue Reading
-
July 24, 2006
24Jul2006
News
Resellers come around to storage virtualization
Storage virtualisation has been around as a concept for years, but value added resellers are finally finding ways to sell it. Continue Reading
-
July 24, 2006
24Jul2006
News
Disaster recovery report card: Measuring your company's disaster recovery profile
Disaster recovery planning is challenging because you don't know what you're planning for or how well your disaster recovery plan will hold up in the face of an emergency. Use this report card to measure your disaster recovery plan and identify ... Continue Reading
-
July 23, 2006
23Jul2006
Tip
Testing iSCSI SAN performance with Iometer
Iometer, a performance test tool for tuning Windows environments, can also be used to tune performance in iSCSI SANs. The tool lets you simulate the SAN's performance by setting many of the parameters and running tests. Repeated runs with different ... Continue Reading
-
July 19, 2006
19Jul2006
News
Answers: VPN and remote access know-how quiz
the crucial questions answered Continue Reading
-
July 19, 2006
19Jul2006
Tip
NAS: How does a client access files?
NAS expert Randy Kerns offers advice to a reader who asked: "How does NAS appear to machines accessing files from it?" Continue Reading
-
July 18, 2006
18Jul2006
News
Midsized firms reach out to backup service providers
Data growth and ever-tightening compliance rules are among the factors driving some organizations to turn to service providers for help with backups. Continue Reading
-
July 16, 2006
16Jul2006
News
Automated provisioning quiz
Take this five-question quiz to see how much you've learned about automated provisioning. Continue Reading
-
July 16, 2006
16Jul2006
News
VPNs and remote access quiz
Take this five-question quiz to see how much you've learned about VPNs and remote access. Continue Reading
-
July 16, 2006
16Jul2006
In Depth
Endpoint security quiz
Take this five-question quiz to see how much you've learned about endpoint security. Continue Reading
-
July 14, 2006
14Jul2006
News
CSI survey: Data breaches still being swept under the rug
The annual CSI/FBI Computer Crime and Security Survey shows companies are reporting fewer financial losses from data breaches. That doesn't mean the good guys are winning. Continue Reading
-
July 14, 2006
14Jul2006
News
Answers: Compliance All-in-One Guide quiz
The key compliance questions unveiled Continue Reading
-
July 13, 2006
13Jul2006
News
Security Bytes: Investigators slam VA over data breach
Meanwhile: Cisco patches a router application flaw, a Washington law firm sues IBM over a server attack; and spammers sucker Web surfers with fake Vladimir Putin death reports. Continue Reading
-
July 13, 2006
13Jul2006
News
Trojan targets Microsoft PowerPoint flaw
Update: The exploit might be tied to an older flaw in Excel. Attackers who exploit the serious flaw could launch arbitrary code. Microsoft says it is investigating. Continue Reading
-
July 12, 2006
12Jul2006
Tip
Remote backup: What are the alternatives to tape?
Archiving expert Bill Tolson offers advice to a reader looking for alternatives to shipping tape offsite, including a graphical representation of the remote replication backup process. Continue Reading
-
July 11, 2006
11Jul2006
News
Critical flaws found in Excel, Flash Player
FrSIRT says holes in Microsoft's spreadsheet program and Adobe's media player could allow attackers to take control of affected machines and initiate malicious commands. Continue Reading
-
July 11, 2006
11Jul2006
News
Microsoft patches seven July security holes, five critical
The software giant's monthly batch of fixes includes critical repairs for Internet Explorer and Windows' networking features, plus "important" bulletins for Internet Information Server. Continue Reading
-
July 11, 2006
11Jul2006
In Depth
Inside MSRC: Debunking Excel exploits
Microsoft's Christopher Budd puts the magnifying glass to Microsoft's July bulletinsand says one alleged Excel exploit isn't what it seems. Continue Reading
-
July 11, 2006
11Jul2006
In Depth
XML Security Learning Guide
Securing XML is an essential element in keeping Web services secure. This SearchSecurity.com Learning Guide is a compilation of resources that review different types of XML security standards and approaches for keeping your XML Web services secure. Continue Reading
-
July 11, 2006
11Jul2006
News
Looking ahead to life without passwords
Security pros know that passwords are nothing but trouble. For them, single-sign on, two-factor authentication and federated ID represent the path to stronger authentication. Continue Reading
-
July 10, 2006
10Jul2006
News
Skills fears as number of IT students plummets
-
July 10, 2006
10Jul2006
News
Downtime: Now here's an idea for all of you flag flyers...
-
July 10, 2006
10Jul2006
In Depth
Case study: A valuable solution
A new telephony and call centre solution from Inter-Tel has transformed the way that e.surv Chartered Surveyors is able to work. Continue Reading
-
July 10, 2006
10Jul2006
News
Security Bytes: Data breach affects 100,000 military personnel
Meanwhile: Phishers use a phone trick to dupe PayPal users; the PCI security standard will get more teeth and a survey illustrates an increase in security breaches Continue Reading
-
July 10, 2006
10Jul2006
News
Application layer logging quiz answers
The key questions revealed Continue Reading
-
July 06, 2006
06Jul2006
News
Strong authentication for businesses large and small
Product review: Customer service could return calls more quickly when there's a problem. But overall, RSA SecurID Appliance 2.0 delivers robust, scalable protection. Continue Reading
-
June 30, 2006
30Jun2006
News
More from SearchSecurity -- July 2006
Highlights from the July 2006 issue of Information Security magazine. Continue Reading
-
June 27, 2006
27Jun2006
News
Cost of Libra magistrates system trebles
The Department of Constitutional Affairs has admitted that the cost of the Libra case management system for magistrates courts will rise to £487m – more than three times the £146m original cost set in 1998. Continue Reading
-
June 26, 2006
26Jun2006
News
Dundee to teach ethical hacking BSc
A degree in ethical hacking will be on offer at a Scottish university from the new academic year. Continue Reading
-
June 19, 2006
19Jun2006
In Depth
Storage Word Search: Summer IT fun
How about some summer storage fun? Try out SearchStorage.com's Word Search game. See if you can find the 15 terms listed. Continue Reading
-
June 15, 2006
15Jun2006
News
Microsoft offers SMBs all-in-one security and protection
Small- to medium-sized businesses (SMBs) are among the key targets of Microsoft's latest solution, Windows Live OneCare. Continue Reading
-
June 14, 2006
14Jun2006
News
ClearCube to stress datacentre gains
Datacentre technology supplier ClearCube Technology is embark upon a programme to introduce its newly released Sentral 5.0 management software. Continue Reading
-
June 14, 2006
14Jun2006
News
HP extends automated change and configuration to the datacentre
A technology agreement with partner Voyence will enable HP to offer datacentre managers an automated network change and configuration management solution. Continue Reading
-
June 14, 2006
14Jun2006
News
Datacentre acceleration market tops £186m
The worldwide application acceleration market was worth £186m in the first quarter of 2006, a 21% increase from the first quarter of 2005, according to research from Gartner. Continue Reading
-
June 14, 2006
14Jun2006
News
Data Connections launches security for datacentre product line
Data Connections, a provider of complete datacentre solutions, has launched - in partnership with NetClarity - RockSolid, a program designed to deliver enhanced network into datacentres. Continue Reading
-
June 14, 2006
14Jun2006
News
Dell delivers datacentre boost
Dell is targeting the datacentre environment with the launch of the ninth-generation of its PowerEdge servers. Continue Reading
-
June 13, 2006
13Jun2006
In Depth
UK IT leaders plan a night under the stars for charity
About 250 senior IT professionals will take part in the annual Byte Night charity sleep-out on London’s Embankment on 22 September in an effort to raise £300,000 to combat child homelessness. Continue Reading
-
June 13, 2006
13Jun2006
News
Fifa ready for cyber attack on World Cup
-
June 07, 2006
07Jun2006
News
CDP overview
Storage volumes are growing at an alarming pace, and tape-based backups are not always possible within an available backup window. Today's businesses are increasingly focused on tighter RTO and RPO. Faster restorations and more recent recovery ... Continue Reading
-
June 05, 2006
05Jun2006
News
NetApp taps SAP for datacentre
Network Appliance (NetApp) has added to its technology collaboration SAP offering SAP compliance and certification for its datacentre offerings. Continue Reading
-
June 05, 2006
05Jun2006
News
TelecityRedbus wins datacentre award
Datacentre services provider TelecityRedbus has been selected by the renowned Stevie Awards in recognition of what has been described as outstanding business turnaround. Continue Reading
-
June 05, 2006
05Jun2006
News
IXEurope heads trial of increased security between datacentres
IXEurope, one of Europe’s fastest growing datacentre services companies, and idQuantique, a quantum cryptography company, have agreed to set up a twin-datacentre pilot site using Quantum Cryptography. Continue Reading
-
June 05, 2006
05Jun2006
News
Fortinet targets high-end blade server market
Fortinet, a provider of multi-threat security solutions, believes it has strengthened its high-end product portfolio with new load-balancing switch and high-performance security blades for its FortiGate-5000 Series, which it calls the world’s only ... Continue Reading
-
June 05, 2006
05Jun2006
News
Fujitsu Siemens injects energy into blade server line
Fujitsu Siemens Computers (FSC) has introduced a number of servers that will likely be used in the datacentre environment. Continue Reading
-
June 01, 2006
01Jun2006
News
FullArmor lives up to its name
PolicyPortal provides an Internet interface to easily configure, monitor and enforce near real-time Active Directory-based policy compliance through client agents. Continue Reading
-
June 01, 2006
01Jun2006
News
BlueCat appliance offers rock-solid security
Hot Pick: The Adonis 1000 appliance bundles DNS and DHCP into an enterprise-class appliance for the centralized secure operation of network addressing. Continue Reading
-
June 01, 2006
01Jun2006
News
Blade servers stand out in sluggish server arena
A survey by IDC has shown that blade servers were among few highlights in a generally sluggish worldwide server market in the first quarter of 2006. Continue Reading
-
June 01, 2006
01Jun2006
News
Appro HyperBlade enhances datacentre experience
Appro, a provider of enterprise computing systems, has launched a dual-core Intel Xeon processor-based HyperBlade server. Continue Reading
-
June 01, 2006
01Jun2006
News
NetApp adds to datacentre systems
Network Appliance (NetApp) has announced a new line of products and services designed to enhance data management capabilities and to claim leadership of open systems storage in the enterprise datacentre. Continue Reading
-
June 01, 2006
01Jun2006
News
Silver Peak expands datacentre disaster recovery
Silver Peak Systems, a provider of network acceleration solutions, has unveiled its NX-5500 network acceleration appliance. Continue Reading
-
June 01, 2006
01Jun2006
News
HP enhances datacentre server lines
HP has announced that the next generation of its ProLiant and BladeSystem server families will include models powered by Intel’s latest Xeon 5100 and 5000 dual-core processors. Continue Reading
-
May 23, 2006
23May2006
News
Sleep out to help homeless children
The annual Byte Night charity sleep-out will take place on 22 September at London’s Victoria Tower Gardens on the Embankment next to the House of Lords. Continue Reading