Archive
Browse the full archive of Computer Weekly online content - see our most recent articles listed below, or browse by year of publication.
2007 Stories
-
July 30, 2007
30Jul2007
News
Warning issued over unpatched Firefox flaw
Vulnerability clearinghouse Secunia and US-CERT have issued advisories about the input validation flaw Continue Reading
-
July 30, 2007
30Jul2007
In Depth
Justifying VoIP deployment without cost-analysis
VoIP and UC deployment ROI can be measured using non-financial metrics. Learn more about VoIP ROI in this article from Yankee Group's Zeus Kerravala. Continue Reading
-
July 30, 2007
30Jul2007
News
Most antispam technologies get failing grade
An independent study finds that many enterprises are not satisfied with traditional antispam technologies. Continue Reading
-
July 30, 2007
30Jul2007
News
Users make iSCSI SANs with USB keys
Users say that Open-E's iSCSI SAN software, which is delivered on a USB stick, is more affordable than prepackaged systems and has more support than free iSCSI target products. Continue Reading
-
July 29, 2007
29Jul2007
News
VoIP services spell trouble for telcos
The rise of VoIP is paving the way for companies that haven't traditionally sold voice services to do so. Risk-adverse telcos slow to move in this rapidly changing environment will be hard pressed to keep up with more agile competitors. Continue Reading
-
July 26, 2007
26Jul2007
News
Stop simultaneous connections to corporate LANs and external Wi-Fi networks
How can you stop simultaneous connections to corporate LANs and external Wi-Fi networks? Find out from expert Lisa Phifer. Continue Reading
-
July 26, 2007
26Jul2007
News
Justifying VoIP deployment without cost-analysis
VoIP and unified communications deployments remain sluggish, as network managers look for ways to justify the cost of the infrastructure and system upgrades. Non-financial return on investment (ROI) metrics can be used as a way to augment the ... Continue Reading
-
July 26, 2007
26Jul2007
News
Riverbed extends WAFS to laptops
Steelhead Mobile installs on workstations without an onsite appliance. Users say they'd like to see better integration between the mobile and data centre versions of the product. Continue Reading
-
July 25, 2007
25Jul2007
News
SaaS: Tricks and traps of uploading data in bulk
The dark side of SaaS is losing control over your data. Learn how to stay in control while uploading data in bulk in this new report from Info-Tech Research. Continue Reading
-
July 25, 2007
25Jul2007
News
Networking certifications : How to pass your Network+ exam
Learn how to pass your Network+ exam in this story on how to study and read to obtain your Cisco certification. Continue Reading
-
July 25, 2007
25Jul2007
News
VoIP solution centre answers users' questions
A new VoIP performance management solution center on Fluke Networks' Web site helps IT professionals to answer some of their VoIP network questions. Continue Reading
-
July 25, 2007
25Jul2007
News
EMC reports Clariion surge, data archiving slump
EMC's revenues are up this quarter, attributed in part to a big boost in Clariion sales, but CEO Joe Tucci is critical of the company's execution in data archiving. Continue Reading
-
July 25, 2007
25Jul2007
News
Serious flaw affects BIND Internet server software
BIND DNS software, used in translating domain names into IP addresses for Internet traffic, has a flaw that could trick users into visiting a malicious Web site. Continue Reading
-
July 25, 2007
25Jul2007
News
Cisco issues warning for wireless LAN controller flaws
Cisco Systems is warning customers of flaws in its wireless LAN controllers that initially crippled a wireless network at Duke University. Continue Reading
-
July 24, 2007
24Jul2007
News
Hifn buys Siafu for storage security, data reduction
Chipmaker Hifn is looking to get into storage systems. It says OEMs are already lined up for encrypted iSCSI SAN and primary storage data reduction products. Continue Reading
-
July 24, 2007
24Jul2007
News
XenSource embeds Symantec storage software
Server virtualisation firm XenSource embeds Symantec's storage management software into its hypervisor Continue Reading
-
July 24, 2007
24Jul2007
News
Apple iPhone crack discovered by security researchers
Researchers have found a way to take complete control of the Apple iPhone by sending a user to a malicious Web site. Continue Reading
-
July 24, 2007
24Jul2007
News
New hacking technique exploits common programming error
Researchers at Watchfire Inc. say they discovered a new technique that exploits a common dangling pointer error. Continue Reading
-
July 23, 2007
23Jul2007
News
LeftHand refreshes iSCSI SAN software
Version 7.0 of LeftHand's iSCSI SAN software contains dozens of new features, including support for four-way replication and brushed-up thin provisioning. Continue Reading
-
July 23, 2007
23Jul2007
News
PCI compliance costs often underestimated, study finds
Companies are moving forward with PCI DSS projects, but many are underestimating the costs associated with compliance. Continue Reading
-
July 23, 2007
23Jul2007
News
Core Security CEO to step down
Paul Paget, the CEO of penetration testing software vendor Core Security Technologies said he is better-suited for start-ups Continue Reading
-
July 23, 2007
23Jul2007
News
NAC growth sluggish as companies consider network security options
Companies are taking a wait-and-see approach, hoping the technology's maturity will make it more cost effective. Continue Reading
-
July 23, 2007
23Jul2007
Tip
Open source PBX: Risk or value?
Open source IP PBX systems like Asterisk have benefits and risks. Learn what they are and assess your readiness for the IP PBX implementation in this tip from Gary Audin. Continue Reading
-
July 23, 2007
23Jul2007
News
LeftHand refreshes iSCSI SAN software
Version 7.0 of LeftHand's iSCSI SAN software contains dozens of new features, including support for four-way replication and brushed-up thin provisioning. Continue Reading
-
July 22, 2007
22Jul2007
News
Black Hat Las Vegas 2007: Special news coverage
SearchSecurity.com covers all the controversy at this year's show with news, features, podcasts, interviews, exploits and more direct from Las Vegas. Continue Reading
-
July 22, 2007
22Jul2007
News
NAC growth sluggish as companies consider network security options
Companies are taking a wait-and-see approach, hoping the technology's maturity will make it more cost effective. Continue Reading
-
July 19, 2007
19Jul2007
News
Windows Home Server offers low-end NAS
Microsoft has released the latest version of its Home Server software, available as low-end NAS by HP and Iomega; SunGard acquires Vericenter. Continue Reading
-
July 19, 2007
19Jul2007
News
VoIP performance testing fundamentals
This guide discusses why it is important to run regular VoIP network performance testing and some of the ways it can be done. Continue Reading
-
July 19, 2007
19Jul2007
News
Wireless interference can be frustrating (and fun?)
Since Wi-Fi operates in unlicensed bands, the enterprise wireless spectrum can be shared by other, seemingly innocuous devices like Bluetooth and wireless game controllers. But interference from such devices, or from having too many devices on one ... Continue Reading
-
July 18, 2007
18Jul2007
News
For Boeing, data security, network access still hazy
Boeing is trying to reshape its network security architecture to better protect sensitive systems from threats without degrading employee productivity. Continue Reading
-
July 18, 2007
18Jul2007
News
CIOs must be act like venture capatalists, says Gartner
CIOs need to adopt a venture-capitalist approach to IT if they are to remain relevant in the prevailing climate of economic growth, according to Dave Aron, vice-president and research director for Gartner executive programs. Continue Reading
-
July 18, 2007
18Jul2007
Tip
Hardening your router: Increasing security with ACLs
Learn how to harden your router to increase network security using ACLs in this step-by-step, automated, ten-minute demo. Continue Reading
-
July 17, 2007
17Jul2007
News
CDP platform purchase considerations
Busy IT organizations are employing continuous data protection (CDP) technologies to guard data on the fly, essentially eliminating the backup window and allowing granular file and system restoration -- sometimes down to the individual disk write ... Continue Reading
-
July 17, 2007
17Jul2007
News
Zero-day auction site complicates security efforts, IT pros say
WabiSabiLabi, the eBay-like marketplace for zero-day flaws, will make it tougher for companies to ward off attackers, some IT security professionals say. Continue Reading
-
July 17, 2007
17Jul2007
News
Unified communications infrastructure threats and defense strategies
Unified communications systems promise exciting productivity gains for workers and cost savings for businesses, but many often underestimate the security threats facing them. John Burke outlines the threats facing unified communications and how to ... Continue Reading
-
July 17, 2007
17Jul2007
News
Oracle plans 46 security updates for database, software
Attackers could tamper with database servers and host operating systems by exploiting flaws across Oracle's product line. Continue Reading
-
July 17, 2007
17Jul2007
News
Branch offices get security, services boost
Juniper Networks released a handful of new branch office offerings, including two new services routers, two secure services platforms and two network management appliances. Continue Reading
-
July 17, 2007
17Jul2007
News
CDP platform specifications
Continuous data protection (CDP) products track changes to files and data -- typically in real time -- recording activity and allowing recovery to an extremely granular level. This effectively reduces backup windows and restore points, allowing busy... Continue Reading
-
July 16, 2007
16Jul2007
News
Oracle's July 2007 CPU has 45 security fixes
Oracle stuffed 45 security updates into its July 2007 CPU, fixing flaws across its product line attackers could exploit remotely to compromise corporate databases. Continue Reading
-
July 16, 2007
16Jul2007
In Depth
ISO 27001 could bridge the regulatory divide, expert says
Karen Worstell, former CISO at Microsoft and AT&T Wireless, now on the advisory board of Neupart A/S, explains how ISO 27001 can be used to help companies comply with a variety of regulations and standards Continue Reading
-
July 16, 2007
16Jul2007
News
EMC upgrades hardware range, goes green - UPDATE
EMC has upgraded its five main hardware lines, introduced power-saving technology and hinted at enhancements to its data de-duplication tools. Continue Reading
-
July 16, 2007
16Jul2007
News
Sun reveals open appliances
EMC has upgraded its five main hardware lines, introduced power-saving technology and hinted at enhancements to its data de-duplication tools. Continue Reading
-
July 13, 2007
13Jul2007
In Depth
Videoconferencing tool gives Uno an edge
Videoconferencing has given Pizzeria Uno the ability to bring together more than 200 people and has enabled more efficient and cost-effective communication. Continue Reading
-
July 13, 2007
13Jul2007
News
Symantec fixes flaws in AntiVirus, Backup Exec
Symantec fixed flaws attackers could exploit in AntiVirus Corporate Edition and Backup Exec to launch malicious code, gain elevated user privileges or cause a denial of service. Continue Reading
-
July 13, 2007
13Jul2007
News
Antispyware legislation gets tepid reviews
Congress is debating three different bills that would punish spyware pushers, but some IT professionals have their doubts about legislation as a solution to the problem. Continue Reading
-
July 12, 2007
12Jul2007
News
Mobility could hold the key to broader UC adoption
Unified communications (UC) has been available for several years in various shapes and forms, but adoption within corporations has been slow. Mobile UC is right around the corner and may act as a catalyst for greater UC adoption. Continue Reading
-
July 12, 2007
12Jul2007
News
IBM washes hands of IceCube storage project
IBM is spinning out its long overdue next-generation storage system, code-named IceCube, and is seeking $15 million in funding to commercialize the product. Continue Reading
-
July 12, 2007
12Jul2007
News
Web security gateways meet rising malware threats
Web security gateways combine layered defense against the rising tide of Web-based malware with URL filtering and application control. Continue Reading
-
July 12, 2007
12Jul2007
News
Zero-day auction site highlights ethical debate
A new auction site plans to cash in on flaw research. Executive Editor Dennis Fisher explores if it's a viable business model and if research should be sold to the highest bidder. Continue Reading
-
July 11, 2007
11Jul2007
News
Mobility could hold the key to broader UC adoption
Unified communications (UC) and unified messaging are on the verge of launching a mobile platform. Learn more about mobile UC from Yankee Group's Zeus Kerravala. Continue Reading
-
July 11, 2007
11Jul2007
News
Video over IP: What the voice manager needs to know
Video over IP lets users stream video and videoconference, but when implementing it, voice managers must consider VoIP integration and traffic concerns. Continue Reading
-
July 10, 2007
10Jul2007
News
Updating a QoS strategy for VoIP traffic
Learn how to update your QoS strategy for VoIP traffic in this tip from Tom Lancaster. Continue Reading
-
July 10, 2007
10Jul2007
News
Cisco networking certification targets entry level
Cisco networking certifications are targeting a new entry-level set with the CCENT certification. Cisco is also adding new elements to its CCNA offering. Continue Reading
-
July 10, 2007
10Jul2007
In Depth
Inside MSRC: Microsoft Server flaw should be given high priority
An Active Directory flaw in Windows 2000 server and Windows Server 2003 should be given high priority, according to Christopher Budd of the Microsoft Security Response Center (MSRC). Continue Reading
-
July 10, 2007
10Jul2007
News
United in threat management part three: how scared are you?
Wrapping up his look at unified threat management, Ian Yates wonders if the technique will help you sleep better at night. Continue Reading
-
July 09, 2007
09Jul2007
News
Microsoft July updates for critical Excel, Windows and .NET flaws
Of the six security updates Microsoft released Tuesday, experts expressed the most concern about a critical glitch in the .NET Framework that could leave client machines and Web servers open to attack. Continue Reading
-
July 09, 2007
09Jul2007
News
Google buy shakes up email archiving
Google's acquisition of Postini will boost adoption of Gmail, pushing email archiving players to add support for hosted applications. Continue Reading
-
July 09, 2007
09Jul2007
News
Data breaches, compliance drive intellectual property protection
Recent high profile data breaches and compliance pressures are forcing companies to spend more on technology to protect intellectual property, according to a new study. Continue Reading
-
July 09, 2007
09Jul2007
News
Unified messaging system updates company's voicemail
Installing a new unified messaging system helped one company in its daily struggles with an outdated voicemail system. Continue Reading
-
July 06, 2007
06Jul2007
News
Microsoft preps six security updates for Windows, Office
Microsoft will release six security updates on Tuesday 10 July to address flaws attackers could exploit to launch malicious code and access sensitive information on victims' machines. Continue Reading
-
July 05, 2007
05Jul2007
News
Security Metrics: Replacing Fear, Uncertainty, and Doubt
In this chapter excerpt from "Security Metrics: Replacing Fear, Uncertainty and Doubt," author Andrew Jaquith reveals ways to present security data in a clean and elegant manner. Continue Reading
-
July 05, 2007
05Jul2007
News
Zero-day auction site opened by Swiss lab
Swiss start-up WabiSabiLabi is offering zero-day findings for qualified buyers. The site could fuel new debate over flaw disclosure. Continue Reading
-
July 05, 2007
05Jul2007
Tip
Wireless security -- Defending Wi-Fi clients
In this tip, Lisa Phifer examines how host-resident wireless IPS agents can help you safeguard Wi-Fi client devices to ensure strong wireless security. Continue Reading
-
July 04, 2007
04Jul2007
News
Networking certifications: How to pass your CCNA exam
Learn how to pass your Cisco Certified Network Associate (CCNA) exam in this pointed advice on Cisco certifications. Continue Reading
-
July 04, 2007
04Jul2007
News
SOA, Web services security gaining priority at large enterprises
All enterprises will have to find tools to secure Web services as Web-based languages, such as extensible markup language (XML) will be gradually introduced into system architectures. Continue Reading
-
July 04, 2007
04Jul2007
News
Cisco users upbeat about security direction
Cisco customers say the vendor's security strategy is headed in the right direction, which is why they believe the networking giant's IronPort integration will be smooth sailing. Continue Reading
-
July 03, 2007
03Jul2007
In Depth
Data migration product specifications
Part of the Tiered Storage Buying guide focusing on product specifications for data migration tools. Continue Reading
-
July 03, 2007
03Jul2007
News
Data storage startups emerge from stealth
Three new storage firms have come out of stealth mode this June. Analysts predict the next new crop of startups will focus on wireless storage, reporting and alternatives to RAID. Continue Reading
-
July 02, 2007
02Jul2007
News
Are PCI auditors pitching products?
Auditors shouldn't be pitching remediation services or products to bring a company into compliance with PCI DSS rules, but some merchants are reporting the practice Continue Reading
-
July 01, 2007
01Jul2007
News
SearchSecurity.com Blogs
-
July 01, 2007
01Jul2007
News
VoIP measurement boosts customer service efficiency
iSelect Technology Manager Jason Egbers says the company's new VoIP measurement tools have helped it improve contact center operations. Continue Reading
-
June 29, 2007
29Jun2007
News
CIOs get solutions to meet governance regulations
CIOs facing a rising bills to meet governance, risk and compliance regulations may be able to control their costs better if they turn to new purpose-built software. Continue Reading
-
June 29, 2007
29Jun2007
News
Software to help CIOs meet governance regulations
CIOs facing a rising bills to meet governance, risk and compliance regulations may be able to control their costs better if they turn to new purpose-built software. Continue Reading
-
June 29, 2007
29Jun2007
In Depth
State agency tiers records storage with Compellent
The South Carolina attorney general's office estimates it will save thousands by storing millions of paper records in digital format using Compellent's automated tiered storage. Continue Reading
-
June 29, 2007
29Jun2007
News
Vendors admit more cooperation needed on security
Security leaders from large software vendors pledge to cooperate on embedding more security into their products. Continue Reading
-
June 28, 2007
28Jun2007
News
SIP fundamentals
Session Initiation Protocol (SIP) will allow true interoperability, eventually enabling every IP-based device and application to communicate seamlessly with one another. This guide discusses some of the basics of SIP, including vulnerabilities, ... Continue Reading
-
June 28, 2007
28Jun2007
News
Network security: Overlay versus perimeter security model debated at Catalyst
Traditional network perimeter security -- firewalls, and even network access control -- may soon be pushed out in favour of using VPNs for network security, which could ease the security burden for networking staff, according to Dave Passmore. The ... Continue Reading
-
June 28, 2007
28Jun2007
In Depth
Corporate Mergers and Acquisitions Security Learning Guide
A panel of experts breaks down M&A security priorities and explains the best ways to manage disparate security staffs, technologies and policies. Continue Reading
-
June 28, 2007
28Jun2007
In Depth
Hacking for Dummies: Test your firewall rules
Before someone else hacks your firewall, test your firewall rules during the self-hacking process to test your network's security. Continue Reading
-
June 28, 2007
28Jun2007
News
Temp agency moves hundreds of terabytes to iSCSI SAN
Adecco replaces 120 TB of Fibre Channel storage with an iSCSI SAN from LeftHand, including storage for large production databases; Exanet adds search; NetApp unleashes Topio. Continue Reading
-
June 27, 2007
27Jun2007
News
Instant messaging usage increase highlights need for policies
Instant messaging is a valuable business tool for some enterprises. For others, it's a security risk. Either way, a recent Burton Group report suggests that all companies should have an IM usage policy, even if they haven't deployed IM yet. Continue Reading
-
June 27, 2007
27Jun2007
News
Iron Mountain buys Accutrac for records management
Continuing its effort to reinvent itself as an online backup and records management company, Iron Mountain announces its second acquisition in this market in as many months. Continue Reading
-
June 27, 2007
27Jun2007
News
Cisco vows to maintain IronPort tech, talent
As it completes the purchase of IronPort Systems, Cisco vows to maintain IronPort's talent base and make investments to keep its newly-acquired technology fresh. Continue Reading
-
June 25, 2007
25Jun2007
News
Richard Granger's departure may jeopardise NHS IT programme
Richard Granger's departure from Connecting for Health may jeopardise the stability and success of the politically driven NHS National Programme for IT. Continue Reading
-
June 25, 2007
25Jun2007
Tip
VoIP/IP Telephony vendor security solutions
Are vendors' VoIP security features all you need, or is it prudent to buy additional security tools to lock down your network? Continue Reading
-
June 25, 2007
25Jun2007
In Depth
IBM chief engineer talks green storage
IBM engineer Clod Barrera discusses the growing energy crisis in storage, the need for better power efficiency metrics and the future for "green" products. Continue Reading
-
June 25, 2007
25Jun2007
News
PCI Council hears complaints, suggestions for changes
Companies with the most stringent security technologies endure hurdles to comply with PCI DSS. Some firms are turning to the upcoming Burton Group Catalyst Conference for answers. Continue Reading
-
June 25, 2007
25Jun2007
News
DHS suffered more than 800 cyber attacks in two years
Senior officials at the US Department of Homeland Security have acknowledged hundreds of security lapses but say improvements have been made. Continue Reading
-
June 25, 2007
25Jun2007
News
Instant messaging usage increase highlights need for policies
A Burton Group report suggests that all companies should have an IM usage policy, even if they haven't deployed IM yet Continue Reading
-
June 25, 2007
25Jun2007
News
Green storage gains ground
HP is just latest vendor to throw its hat into the green storage ring following Pillar Data, HDS and EqualLogic. Continue Reading
-
June 25, 2007
25Jun2007
News
Meet Mr. Asterisk
Adam Turner meets the creator of the Asterisk open source IP PBX and explores the future of the software, which is making major enterprise inroads. Continue Reading
-
June 24, 2007
24Jun2007
News
Gigabit Ethernet and 10 Gigabit Ethernet: Technology overview
This overview of Gigabit Ethernet and 10G lays the foundation for understanding Gigabit Ethernet technology and the advantages it brings to your network. Continue Reading
-
June 24, 2007
24Jun2007
News
VoIP performance testing fundamentals
VoIP network performance testing can mean the difference between a VoIP system working at a high level QoS and a weak system that runs so poorly customers could take their business elsewhere. This guide discusses why it is important to run regular ... Continue Reading
-
June 24, 2007
24Jun2007
News
First in, best dressed?
Telephony company Link Communications Group bought storage from EqualLogic before the vendor had opened its doors in Australia. The company's Vice-President of Global Engineering explains why the organisation took this risky-looking move. Continue Reading
-
June 21, 2007
21Jun2007
In Depth
Storage Decisions Downloads: Executives' storage guide
Ideas of where firms' storage should be and where it's headed. Also key ways to integrate new technologies, processes and ideas without going over budget. Continue Reading
-
June 21, 2007
21Jun2007
News
HP users mull blade storage
HP's "blade everything" strategy is starting to emerge in storage. Users at the HP Technology Forum this week mulled the possibilities for the technology. Continue Reading
-
June 20, 2007
20Jun2007
News
10 Ways to Determine if Video Conferencing Can Up Your Productivity and Reduce Your Costs
Video conferencing technologies are the most in-demand applications of the information age. Learn how it can help you boost productivity and reduce costs. Continue Reading
-
June 20, 2007
20Jun2007
News
HP to acquire SPI Dynamics for Web security
HP says it will would bolster Web site assessments and Web application vulnerabilities with its acquisition of Atlanta-based SPI Dynamics Inc. Continue Reading
-
June 20, 2007
20Jun2007
In Depth
Prevent network hacks with secure Web browsing
Hackers can penetrate your network in almost unlimited ways these days, and that includes through your Web browser. Learn how to improve Web browser security and keep these hackers out of your network. Continue Reading
-
June 19, 2007
19Jun2007
News
Securing the enterprise VoIP perimeter
How to make VoIP work without sacrificing firewalls or network perimeter security. Continue Reading