News

IT management

  • February 25, 2007 25 Feb'07

    HP announces iSCSI VTL for SMBs

    HP's new iSCSI VTL devices include automated backup capabilities for users with fewer than four servers.

  • February 25, 2007 25 Feb'07

    PatchLink acquires STAT Guardian tool

    PatchLink says it will add more muscle to its vulnerability management portfolio by acquiring the STAT Guardian tool from IT vendor Harris Corp.

  • February 22, 2007 22 Feb'07

    Google offers 10 GB inbox

    The search engine giant is offering an email application on a subscription basis with five times the storage capacity of the free version.

  • February 21, 2007 21 Feb'07

    Cisco warns of IP phone flaws

    Attackers could circumvent security restrictions by exploiting flaws in certain Cisco IP phones, the networking giant warned Wednesday.

  • February 20, 2007 20 Feb'07

    Cisco routers threatened by drive-by pharming

    Millions of Cisco routers in circulation could be compromised by a newly-discovered attack technique Symantec calls drive-by pharming, the networking giant warned in an advisory.

  • February 20, 2007 20 Feb'07

    Microsoft confirms new IE flaw

    Attackers could exploit a new flaw in Internet Explorer (IE) to access local files on targeted systems, Microsoft confirmed Tuesday.

  • February 20, 2007 20 Feb'07

    TJX data breach worse than initially feared

    Hackers had access to a larger amount of customer data, TJX executives said in a statement.

  • February 19, 2007 19 Feb'07

    Sourcefire fixes Snort flaw

    Attackers could exploit a flaw in the popular open source Snort IDS tool to cause a denial of service or launch malicious code.

  • February 19, 2007 19 Feb'07

    When security firms merge, some users are losers

    Some users see their services improve when IT security vendors merge with other companies or get acquired. Others say they've been left out in the cold.

  • February 19, 2007 19 Feb'07

    Quiz: Compliance improvement -- Get better as you go forward

    A five-question multiple-choice quiz to test your understanding of the content presented by expert Richard Mackey in this lesson of SearchSecurity.com's Compliance School.

  • February 14, 2007 14 Feb'07

    VoIP complexities stall implementation for SMBs

    VoIP sales in the SMB market are predicted to lead revenue in the next several years, but most SMBs are confused by the number of different solutions.

  • February 14, 2007 14 Feb'07

    New attack technique threatens broadband users

    Millions of broadband users across the globe are threatened by a new attack technique called drive-by pharming

  • February 12, 2007 12 Feb'07

    Mobile carriers admit to malware attacks

    Eighty-three percent of mobile operators surveyed by McAfee Inc. say they've suffered malware infections, but two competing security vendors say the overall threat is still small.

  • February 12, 2007 12 Feb'07

    Microsoft fixes zero-day flaws in Word, Office

    Twelve security updates from Microsoft fix a range of problems, including a flaw in the Malware Protection Engine and previously-exploited zero-days glitches in Word and Office.

  • February 12, 2007 12 Feb'07

    Skype makes more enterprise inroads

    Skype has teamed with FaceTime Communications to give companies more control over Skype use within the enterprise.

  • February 11, 2007 11 Feb'07

    Cybersecurity czar signals government cooperation at RSA Conference

    Cybersecurity chief, Greg Garcia told RSA Conference attendees that government, enterprises and academia need to work together to fight growing Internet threats.

  • February 11, 2007 11 Feb'07

    Solaris 10 has zero-day Telnet flaw

    Attackers could exploit a zero-day flaw in Solaris 10's Telnet daemon to bypass authentication and gain unauthorized system access, security experts warn.

  • February 10, 2007 10 Feb'07

    Cisco VoIP managment guide: Required management tasks

    Comprehensive VoIP management includes the basic network management tasks, but also includes monitoring services such as dial tone delivery, call success rates, telephony delays and impairments, as well as call quality. VoIP telephony management is ...

  • February 08, 2007 08 Feb'07

    Roundup: Vista security, breakability touted at RSA Conference

    At RSA Conference 2007, Microsoft extolled the security virtues of its new operating system, but others weren't afraid to demonstrate how Vista security is lacking.

  • February 08, 2007 08 Feb'07

    New storage IPOs report losses

    Of the 2006 "graduating class" of storage IPOs, two reported losses this week in their first quarter as public companies.

  • February 07, 2007 07 Feb'07

    Briefs: Vulnerabilities found in Trend Micro, Firefox browser

    This week, Trend Micro released a fix for a flaw in its antivirus engine, while no fixes are available for two newly discovered Mozilla Firefox browser flaws.

  • February 07, 2007 07 Feb'07

    EMC plans array-based encryption via PowerPath

    EMC's next security move will be array-based encryption through PowerPath by 2008, according to internal documents obtained by SearchStorage.

  • February 05, 2007 05 Feb'07

    CA backup bug exploitable on Vista

    In what appears to be the first exploit for a third-party app running on Vista, a previously patched buffer overflow vulnerability in CA BrightStor ARCserve Backup has been exploited. One security firm says ISVs aren't taking advantage of Vista's ...

  • February 05, 2007 05 Feb'07

    Acopia hypes heterogeneous snapshot

    The file virtualisation startup is blustering about a demonstration of heterogeneous snapshot technology, but is being coy about releasing a product.

  • February 05, 2007 05 Feb'07

    Symantec chief: Consumer confidence in data protection is key to online growth

    In his keynote at RSA Conference 2007, Symantec CEO John W. Thompson said Big Yellow is ready for the shifting dynamics in the information security market, and implied that Microsoft's growing presence in security is a conflict of interest for its ...

  • February 05, 2007 05 Feb'07

    Rootkit dangers at an 'all-time high'

    Industry experts at RSA Conference 2007 say not only have rootkits become the weapon of choice for malicious hackers, but they've also emerged as useful tools for legitimate businesses trying to exert control over users.

  • February 05, 2007 05 Feb'07

    VoIP security, unified communications need questioned

    VoIP security issues and questions about the business need for unified communications have stalled adoption of both technologies, according to CompTIA's recent survey.

  • February 05, 2007 05 Feb'07

    Gates touts secure access anywhere

    Microsoft's chairman tells RSA Conference 2007 attendees that a combination of authentication and access management strategies is what it takes to protect corporate data, but information security pros are willing to wait for the proof.

  • February 05, 2007 05 Feb'07

    Are there any differences in operations between unified storage and my existing storage systems?

    Normally, a block storage system is handled by a storage professional or storage administrator...

  • February 04, 2007 04 Feb'07

    Vista exploitable, researcher says

    Marc Maiffret, CTO and chief hacking officer of eEye Digital Security, said he has found a way to elevate system privileges by exploiting a flaw in Windows Vista.

  • February 04, 2007 04 Feb'07

    CISOs mastering 'softer' skills

    Why CISOs can no longer rely on technology skills alone and what businesses are looking for when recruiting their next information security leader.

  • February 04, 2007 04 Feb'07

    Email security buying decisions

    Email security can be a daunting task for SMBs -- how do you go about finding the right product? This tip delves into three approaches to email security and the products available.

  • February 04, 2007 04 Feb'07

    Dozens of Web sites spread malicious Trojan

    Update: The same malicious JavaScript keylogger that compromised the Dolphin Stadium Web site last week was found over the weekend on dozens of other high-profile Web sites.

  • February 04, 2007 04 Feb'07

    New zero-day attack targets Microsoft Excel

    Microsoft says maliciously crafted Excel files may permit the execution of arbitrary code. Other Microsoft Office applications may be at risk.

  • February 04, 2007 04 Feb'07

    HDS to acquire Archivas for up to $120M

    HDS will acquire archiving software partner, Archivas for close to $120 million stepping up its effort to compete with EMC in this market.

  • February 04, 2007 04 Feb'07

    HP fills in gaps with product updates

    HP announced updates to several of its products, but analysts are wondering what its ultimate strategy will be for storage virtualisation.

  • February 04, 2007 04 Feb'07

    Intrusion detection systems are alive and kicking

    IPS hasn't overtaken intrusion detection systems just yet. Senior News Writer Bill Brenner reveals what customers want when they're shopping for IDS products.

  • January 30, 2007 30 Jan'07

    Microsoft disputes Word zero-day report

    Symantec is warning of a new zero-day vulnerability in Microsoft Word. But Microsoft doesn't believe the flaw is new.

  • January 30, 2007 30 Jan'07

    Lawyers discuss e-discovery gotchas

    During panel sessions at Legal Tech, lawyers provided their insights into the e-discovery process, retention policies and helping judges get up to speed.

  • January 30, 2007 30 Jan'07

    Symantec unveils 'universal ID system'

    Symantec said the goal is to create a universally accepted identity system across all Web sites -- from online financial institutions to retailers -- for millions of consumers.

  • January 30, 2007 30 Jan'07

    Using IAM tools to improve compliance

    Provisioning and password management tools can ease complexity, reduce help desk calls and save money. But they also have an added benefit: they can help with your compliance woes.

  • January 29, 2007 29 Jan'07

    Hybrid drives hit NAS boxes

    DNF will be making hybrid drives available in all of its storage products, but it doesn't recommend them for IP SANs.

  • January 29, 2007 29 Jan'07

    Managed VoIP -- 10 tips for a smooth migration

    Migrating to managed VoIP doesn't have to be a headache. Here, Verizon Business offers 10 top tips to ensure you get what you need.

  • January 29, 2007 29 Jan'07

    Entrust to sell cheaper hardware tokens

    Security vendor Entrust Inc. will enter the hardware token market selling a $5 one-time password device. Experts say the move could reduce prices across the industry.

  • January 29, 2007 29 Jan'07

    TJX faces lawsuit over data breach

    A class action lawsuit against TJX accuses the retailer of negligence for not doing enough to secure customer data and for keeping quiet about the breach for a month.

  • January 28, 2007 28 Jan'07

    IBM improves data recovery process for TSM users

    Tivoli Storage Manager 5.4, released this week, establishes a disk cache for most recently backed-up files, improving the slow restore times associated with the product.

  • January 28, 2007 28 Jan'07

    IBM to acquire Softek, looks to pump up services biz

    IBM says it intends to use Softek's Transparent Data Migration Facility within its Global Services business.

  • January 25, 2007 25 Jan'07

    Balancing the cost and benefits of countermeasures

    The final tip in our series, "How to assess and mitigate information security threats."

  • January 25, 2007 25 Jan'07

    How to assess and mitigate information security threats

    Learn how to assess and mitigate information security threats, like rootkits, worms and Trojans in the tip series created in collaboration with Realtimepublishers and Dan Sullivan, author of The Shortcut Guide to Protecting Business Internet Usage.

  • January 25, 2007 25 Jan'07

    Malware: The ever-evolving threat

    The first tip in our series, "How to assess and mitigate information security threats"

CIO
Security
Networking
Data Center
Data Management
Close