Archive
Browse the full archive of Computer Weekly online content - see our most recent articles listed below, or browse by year of publication.
2007 Stories
-
June 19, 2007
19Jun2007
News
Securing the enterprise VoIP perimeter
How to make VoIP work without sacrificing firewalls or network perimeter security. Continue Reading
-
June 19, 2007
19Jun2007
News
Endpoint fears drive PatchLink-SecureWave merger
Experts say the PatchLink-SecureWave merger makes sense since IT pros want a better way to protect their endpoint devices. But PatchLink's market supremacy is far from assured. Continue Reading
-
June 19, 2007
19Jun2007
In Depth
Big Microsoft Vista concerns for Big Pharma
The second installment of an ongoing series examining the challenges of deploying Windows Vista and the considerations that go into the decision to roll out the new OS. Continue Reading
-
June 18, 2007
18Jun2007
News
Will HP do the right thing with SPI Dynamics?
Analysts say HP can dramatically boost its security with the purchase of SPI Dynamics, but some users worry about SPI's technology wilting under the new ownership. Continue Reading
-
June 18, 2007
18Jun2007
News
Training budgets proving hard to justify without business metrics
Surveys show most companies are still complacent about green computing. But ActewAGL CIO Carsten Larsen is one of a growing number of CIOs taking up the call to make sustainable ICT a bigger priority. Continue Reading
-
June 17, 2007
17Jun2007
News
Burton Group Catalyst Conference San Francisco 2007
SearchSecurity.com brings you the latest news, interviews, podcasts and more from the Burton Group Catalyst Conference 2007 in San Francisco. Continue Reading
-
June 17, 2007
17Jun2007
News
VoIP security testing fundamentals
Testing your VoIP security system against all the threats that exist on the network can be a full time job. This guide documents how a VoIP system can be tested and suggest some of the available tools to use -- with a focus on fuzzing tools and ... Continue Reading
-
June 17, 2007
17Jun2007
Tip
What's in a VoIP packet -- An introduction to bandwidth for VoIP
Learn what makes up a VoIP packet, how headers work, what protocols transport voice traffic over the Internet and how this traffic uses network bandwidth. Continue Reading
-
June 15, 2007
15Jun2007
In Depth
Is a merger or acquisition in Sourcefire's future?
Sourcefire founder and Chief Technology Officer Martin Roesch, talks about how Sourcefire fits into Security 3.0 theme and how the firm may be involved in a future merger or acquisition. Continue Reading
-
June 14, 2007
14Jun2007
News
AIIA outlines federal election wish list
The Australian Information Industry Association (AIIA) has released its policy expectations for political parties in the upcoming 2007 federal election. Continue Reading
-
June 14, 2007
14Jun2007
News
AIIA outlines federal election wish list
The Australian Information Industry Association (AIIA) has released its policy expectations for political parties in the upcoming 2007 federal election. Continue Reading
-
June 14, 2007
14Jun2007
In Depth
Why hacking contests, 'month-of' projects don't help
Ivan Arce, chief technology officer of Core Security Technologies explains why he thinks hacking contests and public vulnerability disclosure projects do little to improve IT security. Continue Reading
-
June 13, 2007
13Jun2007
In Depth
Web applications tangle security researchers, attract attackers
Web application security researchers are finding that some of their work could land them on the wrong side of the law. As a result, Web applications are more vulnerable to attack. Continue Reading
-
June 13, 2007
13Jun2007
News
Microsoft patches Windows Vista, IE 7
Microsoft fixed 15 flaws in a variety of products Tuesday, including Windows XP, Vista and Internet Explorer 7. Attackers could exploit the most serious flaws for remote code execution. Continue Reading
-
June 12, 2007
12Jun2007
News
VoIP call quality and reporting software improves QoS
Technology developed to power IPTV networks is also helping improve VoIP quality of service. Continue Reading
-
June 12, 2007
12Jun2007
In Depth
Tiered Storage School: Table of Contents
Get a better understanding of what tiering can do for your storage, how it works and why a tiered plan can aid in backup, DR, overall management and long-term archive Continue Reading
-
June 12, 2007
12Jun2007
In Depth
The Art of Software Security Testing
Identifying software security flaws including the proper methods for examining file formats. Continue Reading
-
June 12, 2007
12Jun2007
News
LUN management at the heart of SAN configuration
Disk drives are the foundation of modern data storage, but operating systems cannot use physical storage directly. The physical drive must be translated into a logical space that an operating system sees as a linear address space comprised of ... Continue Reading
-
June 10, 2007
10Jun2007
News
Connecting for Health briefing claims much of NHS NPfIT complete
A confidential Connecting for Health briefing paper for the prime minister has claimed that much of the NHS's £12.4bn National Programme for IT (NPfIT) is complete - although an integrated national care record system has yet to materialise, and ... Continue Reading
-
June 08, 2007
08Jun2007
In Depth
Data retrieval strategies: Document management software overview
The role of document management software in data storage and how it can mitigate risk for the enterprise. Continue Reading
-
June 08, 2007
08Jun2007
In Depth
Deploying VoIP: Five things every CIO should know
Navigating the complexity of a VoIP deployment can be overwhelming and it may seem like you need a technical degree to understand it. Here are five tips to help steer through the fog of a VoIP migration. Continue Reading
-
June 08, 2007
08Jun2007
News
Microsoft to patch Windows Vista, IE 7, Office
In a redesigned advance bulletin for Patch Tuesday, Microsoft said it will fix flaws in Windows Vista, IE 7, Office and other programs. Four updates will address critical problems. Continue Reading
-
June 08, 2007
08Jun2007
News
Serious flaws put Yahoo Messenger users in peril
Attackers could exploit two serious flaws in Yahoo Messenger to run malicious code on targeted machines, vulnerability trackers warned Wednesday. Continue Reading
-
June 08, 2007
08Jun2007
News
VoIP market evolves in 2007
VoIP will see market changes this year as IP PBX sales increase and market leaders shift their focus. Continue Reading
-
June 07, 2007
07Jun2007
News
VoIP performance testing fundamentals
VoIP network performance testing can mean the difference between a VoIP system working at a high level QoS and a weak system that runs so poorly customers could take their business elsewhere. This guide discusses why it is important to run regular ... Continue Reading
-
June 07, 2007
07Jun2007
News
VoIP market evolves in 2007
The VoIP market will mature and grow this year, according to new research. Continue Reading
-
June 06, 2007
06Jun2007
News
Zero-day flaws affect Firefox, IE
A researcher published details on four new zero-day flaws affecting Firefox and Internet Explorer. They could be exploited to log keystrokes, download malware and steal cookies. Continue Reading
-
June 06, 2007
06Jun2007
News
Network access controlled via biometrics
Fingerprint readers, a form of biometrics, have been used to protect data and endpoints, but now IT is using the security technology to control network access Continue Reading
-
June 05, 2007
05Jun2007
News
IBM to acquire Watchfire for risk, compliance
IBM agreed to acquire Waltham, Mass.-based Watchfire Corp. to add Web application and compliance testing tools into Big Blue's Rational development platform. Continue Reading
-
June 05, 2007
05Jun2007
News
Watchfire will help IBM build application security
Analysts have been pushing the Security 3.0 concept this week at Gartner's IT Security Summit, and one analyst says IBM's acquisition of Watchfire illustrates the trend. Continue Reading
-
June 05, 2007
05Jun2007
News
Avaya to merge with Silver Lake and TPG Capital
Telephony giant Avaya will be acquired by a private equity firm. Continue Reading
-
June 04, 2007
04Jun2007
News
SMBs sample SaaS via telecoms
Telecom XO Communications has announced a new, SMB-focused partnership with Jamcracker, a wholesaler of SaaS technology. Analysts say more telecoms will try to offer SMBs IT services with such deals. Continue Reading
-
June 04, 2007
04Jun2007
News
Deploying VoIP: Five things every CIO should know
Navigating the complexity of a VoIP migration can be overwhelming. Here are five tips to help steer through the fog of a VoIP deployment. Continue Reading
-
June 04, 2007
04Jun2007
News
WAN storage guide -- Chapter 1: WAN basics
A WAN basically connects two or more LANs. While this may sound like a relatively straightforward goal, the implications of WAN connectivity have had a profound influence on networking. This chapter covers basic WAN information. Continue Reading
-
June 04, 2007
04Jun2007
In Depth
Unified communication case studies: What you need to know
Learn how others overcame the expected and the unexpected challenges of a UC deployment in our case studies. Continue Reading
-
June 03, 2007
03Jun2007
News
IBM: We're No. 1 in storage hardware
A new combined disk and tape tracker from IDC has IBM trumpeting from the rooftops that it's the market leader. But what's IBM's story when it comes to software? Continue Reading
-
June 03, 2007
03Jun2007
News
Speech technology needs to be more natural to be useful
Once speech technology irons out a few issues, it will become an integral component of many applications and will significantly alter how we access information. In this tip, learn how you can benefit from getting in on this up-and-coming technology. Continue Reading
-
June 01, 2007
01Jun2007
News
Top spammer indicted on email fraud, identity theft
The arrest may reduce the volume of spam in the short-term, say experts and analysts, but the real spam threat comes from criminal gangs based in Asia and Russia. Continue Reading
-
June 01, 2007
01Jun2007
In Depth
WAN storage guide -- Chapter 1: WAN basics
The implications of WAN connectivity have had a profound influence on networking. We look at some of the practical WAN issues, such as bandwidth, cost, latency and reliability. Continue Reading
-
June 01, 2007
01Jun2007
News
Sclavos's VeriSign departure leaves many questions unanswered
Some industry observers say disagreements fueled his resignation, but others say Sclavos's abrupt departure revolved around his role in VeriSign's options accounting practices. Continue Reading
-
June 01, 2007
01Jun2007
News
Check Point promises more VoIP security, fewer slowdowns
Check Point's enhanced Open Performance Architecture is designed for deeper security of technologies like VoIP without the network performance problems that often come with it. Continue Reading
-
June 01, 2007
01Jun2007
News
Springing leaks: Getting smart about data loss prevention
Companies are showing increased interest in data loss prevention (DLP) products, but they won't work well unless the business needs are understood and well defined. Continue Reading
-
June 01, 2007
01Jun2007
News
Google dives into security market
Search engine giant Google has acquired security startup GreenBorder Technologies, making it a bigger player in the wider information security market. Continue Reading
-
June 01, 2007
01Jun2007
News
HDS adds SAN muscle to archive
Hitachi Data Systems integrates its archive software across its product line and adds important new features, including replication, data deduplication and security. Continue Reading
-
May 31, 2007
31May2007
News
VoIP rush heats up cooling debate
Increased VoIP adoption is putting pressure on data centres' power and cooling requirements Continue Reading
-
May 31, 2007
31May2007
News
It's cool to think about heat
If you're not thinking about power and cooling, you're behind the curve. Continue Reading
-
May 31, 2007
31May2007
News
Cisco, Nortel frontrunners in Avaya acquisition rumors
Cisco and Nortel are said to be amongst those circling the still-live body of VoIP vendor Avaya, but analysts disagree on which, and why. Continue Reading
-
May 31, 2007
31May2007
News
HDS CEO quits for HP storage biz
Dave Roberson, CEO of Hitachi Data Systems since 2006, has jumped ship to HP to run the server giant's storage business. Continue Reading
-
May 30, 2007
30May2007
News
Brocade gets into the HBA business
Experts say the move, based on a partnership with LSI, could lower HBA pricing across the board and be the first step toward a Brocade-developed storage virtualization product. Continue Reading
-
May 29, 2007
29May2007
News
SAN School: Table of contents
What is a storage area network? What are the benefits and pitfalls of installation? How can a SAN fit into your organization? These questions and more are answered SAN School. Continue Reading
-
May 29, 2007
29May2007
In Depth
The man behind the Month of Search Engine Bugs speaks
Ukrainian security researcher Eugene Dokukin, more widely known by his online name MustLive, is about to launch a new "Month-of" flaw disclosure project focusing on search engine bugs, at a time when many security professionals are dismissing such ... Continue Reading
-
May 29, 2007
29May2007
News
The wireless future offers plenty of voice possibilities
Farpoint Group's Craig Mathias surveys the future of wireless networks and their ability to carry voice traffic. Continue Reading
-
May 29, 2007
29May2007
News
Bridging VoIP islands
WAN optimisation makes it possible to connect campus VoIP connections Continue Reading
-
May 25, 2007
25May2007
In Depth
When Microsoft Vista and VPNs don't mix
Papa Gino's is ahead of many companies in deploying Windows Vista, thanks to its involvement in the Microsoft TAP program. But VPN compatibility has been a sticking point. Continue Reading
-
May 25, 2007
25May2007
In Depth
Admins run into trouble with Microsoft updates
A DNS service failure and an ongoing WSUS glitch are among this month's frustrations as IT administrators try to deploy the latest security patches from Microsoft. Continue Reading
-
May 25, 2007
25May2007
News
VoIP advice from the trenches
ITKE, or ITKnowledge Exchange, is simply a cool (and quick) way to get a response to your VoIP-related questions. Continue Reading
-
May 24, 2007
24May2007
News
Data retrieval strategies: Retrieving email and database archives overview
This overview focuses on the considerations involved in email and database archives with an emphasis on retention and search to meet legal discovery requirements. Continue Reading
-
May 24, 2007
24May2007
In Depth
Network access control learning guide
From PDAs to insecure wireless modems, users have myriad options for connecting to -- and infecting -- the network. Created in partnership with our sister site SearchSecurity.com, this guide offers tips and expert advice on network access control. ... Continue Reading
-
May 24, 2007
24May2007
News
Microsoft NAP-TNC compatibility won't speed adoption, users say
Users hail the new compatibility of Microsoft NAP and the Trusted Computing Group's TNC architecture. But they say it won't speed up their adoption timetables. Continue Reading
-
May 24, 2007
24May2007
News
McAfee launches IPS for 10g networks, but is IT ready?
McAfee unveiled a new IPS offering for 10-gigabit Ethernet networks and announced the upgrade and integration of several other products. One analyst offers a mixed assessment. Continue Reading
-
May 24, 2007
24May2007
News
Microsoft fixes Office 2007 patch issues, releases MOICE
The Microsoft Security Response Center acknowledged that some of the company's May 8 security updates didn't make it to machines running Office 2007 on Windows Vista. Continue Reading
-
May 24, 2007
24May2007
News
Symantec, Huawei form joint storage, security company
Symantec has formed a joint venture with storage and networking hardware company Huawei and indicated jointly developed products are coming to the US Continue Reading
-
May 24, 2007
24May2007
News
Sourcefire, Nmap deal to open vulnerability scanning
Sourcefire and Insecure.org have inked an agreement to develop open source vulnerability scanning tools based on Insecure's Nmap scripting engine. Continue Reading
-
May 24, 2007
24May2007
News
IETF approves new weapon to fight spam, phish
DomainKeys Identified Mail specification (DKIM) gained approval as an official IETF standard. The approval is seen as a major step in the fight against spam and phishing attacks. Continue Reading
-
May 24, 2007
24May2007
News
Microsoft investigates new Office zero-day flaw
Attackers could exploit a newly-discovered zero-day flaw in Office 2000 to run malicious code on targeted machines, Symantec warned. Continue Reading
-
May 24, 2007
24May2007
News
Cisco, EMC partner on SAN encryption
Cisco will ship encryption in switches later this year integrated with EMC's RSA key management software. Users are curious but cautious about its impact on other services. Continue Reading
-
May 22, 2007
22May2007
News
Mitel acquires Inter-Tel, signaling more consolidation to come
Mitel acquired Inter-Tel last week, signaling a trend toward vendor consolidation in the VoIP market and creating stronger options for SMBs. Continue Reading
-
May 22, 2007
22May2007
News
Microsoft unveils unified communications devices
Microsoft unveils unified communications devices. Continue Reading
-
May 22, 2007
22May2007
News
Selling network certification: How to talk up your credentials to current and future employers
Network certification has its benefits, but certification alone no longer guarantees employment. In this tip, learn how to justify your credentials' value. Continue Reading
-
May 21, 2007
21May2007
News
Cisco warns of new IOS flaws
The new flaws are classified as "low," but if exploited they could result in a sustained DoS condition, Cisco said. Continue Reading
-
May 21, 2007
21May2007
News
EMC users push for better power consumption
EMC announces a 1.8 PB VTL, deduplication for VMware and bare-metal restore for servers as users caution the company to stay focused on everyday problems, such as power consumption. Continue Reading
-
May 21, 2007
21May2007
News
Mobile instant messaging enhances company's business processes
A mobile IM service acquired by a hosted VoIP provider encourages more companies to enhance their business processes. Continue Reading
-
May 21, 2007
21May2007
News
Microsoft, TCG partner on network access control; Cisco takes own route
Microsoft and the Trusted Computing Group (TCG) have joined forces to create better interoperability between network access control solutions with the announcement of a new specification which ensures that Microsoft's Network Access Protection (NAP)... Continue Reading
-
May 20, 2007
20May2007
Tip
Manipulating VoIP Security
This tip provides an extensive list of sites that track and document VoIP attack tools. Continue Reading
-
May 20, 2007
20May2007
News
Learn NetStar's secret to success
NetStar is a systems integrator and managed service provider and also a survivor of the dot.com crash. The company secured venture capital funding way back at the turn of the century and has put the money to good use, eschewing the ebony ... Continue Reading
-
May 18, 2007
18May2007
Opinion
Action is the deal on Naked Leader's blog
The Deal is the latest blog to launch on ComputerWeekly.com - and one with a twist. David Taylor, author of The Naked Leader, said, "My blog won't be about discussion and debate, but about action." Continue Reading
-
May 17, 2007
17May2007
News
VoIP security fundamentals
VoIP security is a challenge for IT staff because IP telephony brings with it not only the security problems of data networks but also new threats specific to VoIP. In this fundamentals guide, learn about network security threats and emerging IP ... Continue Reading
-
May 16, 2007
16May2007
News
Screencast: How to configure a UTM device
In this exclusive screencast, expert David Strom demonstrates the configuration options available in SonicWall's unified threat management product. Continue Reading
-
May 16, 2007
16May2007
News
When signature based antivirus isn't enough
Zero-day exploits, targeted attacks and increasing demands for endpoint application controls are driving the rapid metamorphosis from signature-based antivirus and antispyware to HIPS-based integrated products. Continue Reading
-
May 11, 2007
11May2007
News
Choosing WAN providers: Key questions to ask
When evaluating carrier services for the WAN, it's imperative to ask some key questions regarding customer service, service-level agreements, global coverage, management and monitoring capabilities, and underlying technologies. Make sure these ... Continue Reading
-
May 11, 2007
11May2007
In Depth
Microsoft should scrap Patch Tuesday
Instead of leaving flaws unpatched for weeks between cycles, Microsoft should use its resources to produce high-quality patches shortly after vulnerabilities are discovered. Continue Reading
-
May 11, 2007
11May2007
News
Cisco fixes fresh flaws in IOS
Attackers could exploit two flaws in Cisco's IOS to cause a denial of service or tamper with data in a device file system. Continue Reading
-
May 11, 2007
11May2007
News
VoIP, unified communications adoption continue to rise
VoIP and unified communications adoption continue to rise steadily in the enterprise, according to Infonetics Research's latest report. Continue Reading
-
May 10, 2007
10May2007
News
EMC buys Indigo Stone for bare-metal restore
EMC has been hush-hush about adding Indigo Stone, a bare-metal restore software company, to its stack of acquisitions. Continue Reading
-
May 10, 2007
10May2007
In Depth
PayPal security measures help stamp out fraud
PayPal's 133 million online customers are the biggest ocean phishers have to plunder. CISO Michael Barrett wants to make it safe to be in the water; and he's not going at it alone. Continue Reading
-
May 10, 2007
10May2007
In Depth
ISCSI TCP/IP TOE card purchase considerations
A look at the specific considerations in purchasing iSCSI Continue Reading
-
May 10, 2007
10May2007
In Depth
ISCSI TCP/IP TOE card specifications
Key specifications for a cross-section of popular iSCSI TOE cards. Continue Reading
-
May 09, 2007
09May2007
News
Symantec fixes flaws in Norton, pcAnywhere
Attackers could exploit flaws in Symantec's Norton AntiVirus and pcAnywhere to launch malicious code or compromise a user's session credentials. Continue Reading
-
May 08, 2007
08May2007
News
Companies plug FTP holes with secure FTP servers
Some companies are investing in secure FTP suites to give employees and business partners the ability to transfer large files such as large documents, audio, video and photos. Continue Reading
-
May 08, 2007
08May2007
News
What top five subjects does the CCNA test focus on?
Know what subjects are tested most heavily on in the CCNA exam. Use this top five list from Cisco certifications expert Dave Minutella in this response. Continue Reading
-
May 08, 2007
08May2007
In Depth
4 Gbit Fibre Channel switch purchase considerations
As SANs scale up, data centres often upgrade and expand the SAN switch infrastructure. Here's what to look for when scaling Continue Reading
-
May 08, 2007
08May2007
In Depth
4 Gbit Fibre Channel switch product specifications
Product snapshots highlighting key specifications for a cross section of popular director-class 4 Gbit and faster FC switch products. Continue Reading
-
May 08, 2007
08May2007
News
ISCSI TCP/IP TOE card specifications
One means of improving iSCSI traffic performance is to include TOE (TCI/IP Offload Engine) capability on the Ethernet card itself. An iSCSI TOE allows the network adapter to process iSCSI traffic (often all Ethernet LAN traffic) locally -- relieving... Continue Reading
-
May 07, 2007
07May2007
News
Is RAID in general an obsolete technology today?
This is a technology that is so commonly used, so transparent, that we really don't even think about it... Continue Reading
-
May 07, 2007
07May2007
News
What are the most important new disk drive technologies?
The first 1 terabyte hard disk drives have appeared. What will be the impact of hard disk drive technologies such as perpendicular recording, 2.5-inch high-performance drives, secure erase, encryption and hybrid technology drives? Continue Reading
-
May 07, 2007
07May2007
In Depth
The trouble with Google hacking techniques
Some IT security professionals say the threat posed by Google hacking techniques is overblown and that companies can easily avoid it with a layered security program. One skeptical expert is Ira Winkler, founder of the Internet Security Advisors ... Continue Reading
-
May 06, 2007
06May2007
News
Intransa launches 10 GigE IP SAN
Intransa is now shipping a standalone 10 GigE system, but it may take a while for applications and operating systems to be ready for the big pipe. Continue Reading
-
May 06, 2007
06May2007
Tip
VoIP security -- Free IP telephony fuzzing tools
Protect your organization's VoIP security with free VoIP security tools designed to test IP telephony vulnerability. Continue Reading
-
May 03, 2007
03May2007
News
Quiz: Preventing data leaks
A six-question multiple-choice quiz to test your understanding of the content presented by expert Richard Bejtlich in this lesson of SearchSecurity.com's Data Protection Security School. Continue Reading
-
May 03, 2007
03May2007
News
Quiz: Enterprise strategies for protecting data at rest
A five-question multiple-choice quiz to test your understanding of the e-discovery content presented by expert Perry Carpenter in this lesson of SearchSecurity.com's Data Protection Security School. Continue Reading