News
IT strategy
-
June 13, 2006
13
Jun'06
Fifa ready for cyber attack on World Cup
-
June 01, 2006
01
Jun'06
FullArmor lives up to its name
PolicyPortal provides an Internet interface to easily configure, monitor and enforce near real-time Active Directory-based policy compliance through client agents.
-
June 01, 2006
01
Jun'06
BlueCat appliance offers rock-solid security
Hot Pick: The Adonis 1000 appliance bundles DNS and DHCP into an enterprise-class appliance for the centralized secure operation of network addressing.
-
May 03, 2006
03
May'06
Shifting services back indoors
Almost a quarter of blue chip firms in the UK are so disillusioned with outsourcing they are hauling their services back in-house.
-
March 28, 2006
28
Mar'06
Outsourced way to hire contract staff
IT services company FDM has launched a "straight through" recruitment service to help IT departments in the finance sector recruit contract staff.
-
March 07, 2006
07
Mar'06
Networks news in brief
Short takes from this week's network news
-
February 27, 2006
27
Feb'06
Not just a big switch
Fibre Channel directors don't just provide lots of ports, they also offer ways to connect disparate SANs, isolate data and devices within a fabric, and configure throughput for specific applications. We look at how the big three directors match up.
-
December 21, 2005
21
Dec'05
Sony struggles to regain trust
The company is trying to mend a reputation bruised over its antipiracy practices. One advocate for online civil liberties explains why redemption is a long way off.
-
December 20, 2005
20
Dec'05
Guidance turns investigative tools on itself
The forensics software firm says it was compromised by hackers in November. It's just one in a growing list of companies admitting to recent attacks or lax security.
-
December 14, 2005
14
Dec'05
Flaws reported in Trend Micro ServerProtect
Storage and security managers should be wary of vulnerabilities in the AV product that could enable a denial-of-service and malicious code execution. Workarounds are available.
-
December 14, 2005
14
Dec'05
Hospital ditches EMC Centera for long-term archiving
UHCS in Augusta, Ga., is replacing its Centera archiving system from EMC with IBM's GMAS product after performance, reliability and cost issues forced it to seek alternatives.
-
December 14, 2005
14
Dec'05
Roundup: 2005's 'curious malicious code'
These viruses, worms and Trojans sometimes escaped our notice. But it didn't get past one antivirus vendor, who rounded up some of the year's stranger offerings from the underground.
-
December 12, 2005
12
Dec'05
Two Windows patches coming, IE fix uncertain
It remains to be seen whether the software giant on Dec. 13 will address an outstanding Internet Explorer issue that is currently the target of a malicious Trojan.
-
December 12, 2005
12
Dec'05
Titan Rain shows need for better training
SANS says the Chinese-based attacks demonstrate the growing sophistication of hackers, and the need for IT admins who can articulate the dangers to execs.
-
December 07, 2005
07
Dec'05
Security pros gain ground in the board room
Executives are paying more attention to their IT security managers and taking more responsibility for online threats against their companies, according to a new study.
-
December 06, 2005
06
Dec'05
Cybersecurity policy takes cooperation, trust, experts say
At the Infosecurity confab, experts explain why sharing information -- even when it's embarrassing -- is vital to securing not only corporations, but also the national infrastructure.
-
November 30, 2005
30
Nov'05
Out-of-cycle IE patch may be imminent
Microsoft may release a critical Internet Explorer fix before the next Patch Tuesday, amid reports that malicious code is targeting a memory corruption flaw.
-
November 29, 2005
29
Nov'05
By the numbers: The new SOX breakdown
SOX spending for 2006 is expected to be on par with last year but it's not quite dÉjÀ vu all over again. More dough will go to technology.
-
November 28, 2005
28
Nov'05
Who owns and administers the internet's addresses?
Given that IPv4 addresses are a finite resource, we can expect concerns over their distribution to increase in the coming years.
-
November 28, 2005
28
Nov'05
Step 6: Configuring wireless clients
With wireless networks proliferating it is a good idea to understand what it takes to build a VPN for a wireless gateway. Contributor and Microsoft MVP Brien Posey details the necessary steps in this step-by-step guide.
-
November 21, 2005
21
Nov'05
Wireless security: Public Wi-Fi could open security holes
A Michigan county is working to give everyone within its borders wireless Internet access. But when it comes to security, users are on their own.
-
November 20, 2005
20
Nov'05
Wireless security crucial to railway safety
A transportation firm uses wireless technology to keep the trains running on time. But securing mobile devices isn't easy when they're spread across the globe.
-
November 16, 2005
16
Nov'05
Wireless security: Companies deal with software updates
A health care provider found it could use wireless technology to dramatically boost patient care. But first it had to figure out how to deploy security updates over a wireless network.
-
November 14, 2005
14
Nov'05
Hackers installing keyloggers at a record rate
iDefense researchers have found that keylogger infections are up 65% over the year before, putting the private data of tens of millions of users at risk.
-
November 14, 2005
14
Nov'05
Sony rootkit uninstaller causes bigger threat
Princeton researchers say a security hole that appears when users try to remove Sony's copy protection software presents an even greater risk than the original rootkit.
-
November 14, 2005
14
Nov'05
Demand for development skills soars as firms seek business edge
Computer Weekly salary survey shows IT departments eager to secure skills for the future.
-
November 10, 2005
10
Nov'05
Security Bytes: FTC cracks down on alleged spyware distributors
Patches fix serious RealPlayer flaws, IM malcode launches phishing attacks; Microsoft warns of Macromedia Flash flaw; Liberty Alliance pushes stronger authentication; FEMA data security is in question; patches fix Veritas flaws and TransUnion ...
-
November 09, 2005
09
Nov'05
Trojans target Sony DRM and Windows
Security researchers track two new Trojan horses. One exploits the Sony DRM program. The other could possibly take aim at the Windows flaw Microsoft patched this week.
-
November 08, 2005
08
Nov'05
Sony takes second stab at DRM patch
But a top executive's response to criticism over the company's use of rootkit technology has added fuel to the backlash.
-
October 24, 2005
24
Oct'05
Reporter's Notebook: NYC 'controls the software industry'
At Information Security Decisions: a security "rock star" rages against the Microsoft machine; banging the drum for enterprise security; a sour note on zero-day exploits.
-
October 19, 2005
19
Oct'05
Elements of a data protection strategy
In this excerpt from Data Protection and Lifecycle Management, Tom Petrocelli addresses the importance of securing data for regulatory compliance and outlines the five components of a data protection strategy.
-
October 17, 2005
17
Oct'05
How avian flu could threaten IT security
Experts say a potential bird flu pandemic could have a disastrous effect on IT infrastructures. But if companies plan well, those infrastructures could also help minimize chaos.
-
October 12, 2005
12
Oct'05
Quiz: What's your infosec IQ?
We've collected our toughest questions to see how well you stand up to a challenge. Put your knowledge to the test and let us know how you do.
-
September 27, 2005
27
Sep'05
Secure your extended enterprise
How do you achieve the fine balance between ensuring that there is truly free access to sensitive information, without sacrificing security?
-
September 26, 2005
26
Sep'05
IT spending at midsized companies: How much does size matter?
-
September 26, 2005
26
Sep'05
Secure the interests of your extended enterprise
How do you achieve the fine balance between ensuring that there is truly free access to sensitive information and applications from both inside and outside the firewall, without sacrificing security?
-
September 22, 2005
22
Sep'05
Who best to avert data security disaster: government or business?
People look to government to prevent catastrophe. But in the Information Age, some of those people, namely those working in IT shops, need to do their part to protect us.
-
September 22, 2005
22
Sep'05
Telework key to surviving security disaster, expert says
Cybersecurity Industry Alliance Executive Director Paul Kurtz explains why telework may be crucial to surviving The Big One.
-
September 21, 2005
21
Sep'05
Leave no trace: Understanding attackers' motives
This excerpt from Chapter 1 of "Rootkits: Subverting the Windows Kernel," explains the purpose of back doors and how hackers use them, as well as how stealth plays a major role in most successful attacks.
-
September 21, 2005
21
Sep'05
Catastrophic cyberattack unlikely, experts say
Predictions of a cataclysmic disaster have been around for awhile. But one security officer cites reasons why the Internet can never be brought down.
-
September 20, 2005
20
Sep'05
SAS drives product roundup
Serial-attached SCSI (or SAS) drives offer significant storage capacity at a much lower cost, while maintaining reasonable performance. Find out who the vendors are in this market.
-
September 20, 2005
20
Sep'05
Security tools help reduce insider threat.
-
September 20, 2005
20
Sep'05
Insider threat seen as biggest data security issue
Whether they oversee physical or online defenses, security officers say the disaster scenario that scares them most begins with an insider with malicious intentions.
-
September 18, 2005
18
Sep'05
Ensure that legal responsibilities are clear -- Especially when trouble strikes
Excerpt from Chapter 15 of Information Nation Warrior: Information Management Compliance Boot Camp.
-
September 11, 2005
11
Sep'05
VoIP turns up the heat on firewalls
New research shows that many organizations are increasingly concerned about VoIP security and plan to augment their firewalls within the next year, changing the landscape of the firewall market.
-
September 06, 2005
06
Sep'05
Firewalls can help or hurt, so plan carefully
-
September 05, 2005
05
Sep'05
Which data backup software is best? - Page 2
-
September 05, 2005
05
Sep'05
Which data backup software is best? - Page 4
-
September 05, 2005
05
Sep'05
Which data backup software is best? - Page 3
-
September 05, 2005
05
Sep'05
IE 7.0 may usher in wave of RSS exploits
Experts warn that Web-feed enhancements in Microsoft's new Web browser may be just the thing crackers need to compromise networks and private data.