News

News Archive

  • February 04, 2007 04 Feb'07

    Email security buying decisions

    Email security can be a daunting task for SMBs -- how do you go about finding the right product? This tip delves into three approaches to email security and the products available.

  • February 04, 2007 04 Feb'07

    Dozens of Web sites spread malicious Trojan

    Update: The same malicious JavaScript keylogger that compromised the Dolphin Stadium Web site last week was found over the weekend on dozens of other high-profile Web sites.

  • February 04, 2007 04 Feb'07

    RSA Conference 2007: Special news coverage

    Check out news, interviews, product announcements, podcasts and more live from the RSA Conference 2007 in San Francisco.

  • February 04, 2007 04 Feb'07

    HP fills in gaps with product updates

    HP announced updates to several of its products, but analysts are wondering what its ultimate strategy will be for storage virtualisation.

  • February 04, 2007 04 Feb'07

    Intrusion detection systems are alive and kicking

    IPS hasn't overtaken intrusion detection systems just yet. Senior News Writer Bill Brenner reveals what customers want when they're shopping for IDS products.

  • February 04, 2007 04 Feb'07

    HDS to acquire Archivas for up to $120M

    HDS will acquire archiving software partner, Archivas for close to $120 million stepping up its effort to compete with EMC in this market.

  • February 04, 2007 04 Feb'07

    New zero-day attack targets Microsoft Excel

    Microsoft says maliciously crafted Excel files may permit the execution of arbitrary code. Other Microsoft Office applications may be at risk.

  • February 04, 2007 04 Feb'07

    Open source - What voice managers need to know

    Open source technology can make sense for VoIP deployments, and can be used in a hybrid approach with existing proprietary hardware or software. Learn more in this tip.

  • January 30, 2007 30 Jan'07

    Windows Vista voice command tricked

    An attacker found a way to play audio commands at a user's machine tricking the voice command capability in Vista into running arbitrary code.

  • January 30, 2007 30 Jan'07

    Symantec exploitation video hits YouTube

    Symantec posted a clip on the popular video-sharing site showing researchers using a newly discovered flaw in Microsoft Word to drop an executable on a vulnerable machine.

  • January 30, 2007 30 Jan'07

    Using IAM tools to improve compliance

    Provisioning and password management tools can ease complexity, reduce help desk calls and save money. But they also have an added benefit: they can help with your compliance woes.

  • January 29, 2007 29 Jan'07

    Managed VoIP -- 10 tips for a smooth migration

    Migrating to managed VoIP doesn't have to be a headache. Here, Verizon Business offers 10 top tips to ensure you get what you need.

  • January 29, 2007 29 Jan'07

    Entrust to sell cheaper hardware tokens

    Security vendor Entrust Inc. will enter the hardware token market selling a $5 one-time password device. Experts say the move could reduce prices across the industry.

  • January 29, 2007 29 Jan'07

    TJX faces lawsuit over data breach

    A class action lawsuit against TJX accuses the retailer of negligence for not doing enough to secure customer data and for keeping quiet about the breach for a month.

  • January 29, 2007 29 Jan'07

    VoIP call features give users more bang for their buck

    2006 saw an increase in the popularity of VoIP and encouraged many competing service providers to offer features such as voicemail and Caller ID as standard in their best-selling service plans.

  • January 29, 2007 29 Jan'07

    Hybrid drives hit NAS boxes

    DNF will be making hybrid drives available in all of its storage products, but it doesn't recommend them for IP SANs.

  • January 29, 2007 29 Jan'07

    Managed VoIP -- 10 tips for a smooth migration

    Migrating to managed VoIP doesn't have to be a headache. Here, Verizon Business offers 10 top tips to ensure you get what you need.

  • January 28, 2007 28 Jan'07

    IBM improves data recovery process for TSM users

    Tivoli Storage Manager 5.4, released this week, establishes a disk cache for most recently backed-up files, improving the slow restore times associated with the product.

  • January 28, 2007 28 Jan'07

    IBM to acquire Softek, looks to pump up services biz

    IBM says it intends to use Softek's Transparent Data Migration Facility within its Global Services business.

  • January 28, 2007 28 Jan'07

    Brocade unveils McData integration roadmap

    McData's directors and FICON routers will remain separate product lines for now; McData's SAN management software will replace Brocade's Fabric Manager.

  • January 27, 2007 27 Jan'07

    Network visualization, automation: At odds?

    Visualization is a powerful tool. But in the context of network management, the prevalence of graphs may indicate that your network management system (NMS) is not ready to meet the requirements of autonomic network performance. Why so? Loki ...

  • January 25, 2007 25 Jan'07

    IBM tool makes online purchases anonymous

    A new tool makes online purchases anonymous by using artificial identity information. Experts say enterprises need to adopt the technology before it can become a viable option.

  • January 25, 2007 25 Jan'07

    Apple fixes Mac Wi-Fi flaw

    The Mac OS X Wi-Fi flaw Apple fixed on 24 Jan was first disclosed as part of the Month of Kernel Bugs in November. Attackers could exploit it to crash the targeted system.

  • January 25, 2007 25 Jan'07

    Symantec makes major update to Enterprise Vault

    Symantec adds automated data classification and integration with security products in Version 7.0 of its Enterprise Vault archiving tool; EMC reports record earnings for the fourth quarter.

  • January 25, 2007 25 Jan'07

    Network-based attacks

    The second tip in our series, "How to assess and mitigate information security threats."

  • January 25, 2007 25 Jan'07

    Balancing the cost and benefits of countermeasures

    The final tip in our series, "How to assess and mitigate information security threats."

  • January 25, 2007 25 Jan'07

    Attacks targeted to specific applications

    The fourth tip in our series, "How to assess and mitigate information security threats."

  • January 25, 2007 25 Jan'07

    How to assess and mitigate information security threats

    Learn how to assess and mitigate information security threats, like rootkits, worms and Trojans in the tip series created in collaboration with Realtimepublishers and Dan Sullivan, author of The Shortcut Guide to Protecting Business Internet Usage.

  • January 25, 2007 25 Jan'07

    Threats to physical security

    Tip No. 6 in our series, "How to assess and mitigate information security threats."

  • January 25, 2007 25 Jan'07

    Information theft and cryptographic attacks

    The third tip in our series, "How to assess and mitigate information security threats."

  • January 25, 2007 25 Jan'07

    Malware: The ever-evolving threat

    The first tip in our series, "How to assess and mitigate information security threats"

  • January 24, 2007 24 Jan'07

    TJX data breach info used to make fraudulent purchases

    Fraudulent purchases have been reported globally, according to a trade association that represents more than 200 banks in Massachusetts.

  • January 24, 2007 24 Jan'07

    iSCSI SANs grow in midmarket, enterprise

    Because transporting "SCSI over IP" leverages ubiquitous Ethernet networks, that translates to lower cost, easier maintenance and simpler management, which makes SAN deployment more attractive for SMEs.

  • January 24, 2007 24 Jan'07

    Microsoft investigates new Word zero-day

    An unpatched memory-corruption flaw in Microsoft Word is the target of "limited" attacks in the wild, Microsoft confirmed Thursday.

  • January 24, 2007 24 Jan'07

    Microsoft, Nortel introduce new unified communications apps

    Microsoft and Nortel's Innovative Communications Alliance takes unified communications to the next level with its latest combined applications.

  • January 24, 2007 24 Jan'07

    RSVP ready to manage VoIP, video traffic

    Though its 10 year past was riddled with failures, RSVP is fast returning as one of the best tools for managing QoS for VoIP and video.

  • January 23, 2007 23 Jan'07

    Veracode launches on-demand code analysis service

    New start up Veracode gives customers the ability to analyse the application binary, and not simply the source code.

  • January 23, 2007 23 Jan'07

    Cisco fixes IOS flaws

    Attackers could exploit three Cisco IOS flaws to cause a denial of service or launch malicious code. The networking giant has released fixes.

  • January 23, 2007 23 Jan'07

    McAfee: Malware all about ID theft

    The use of keylogger technology is surging and there's been a 100-fold rise in phishing attacks, according to a new report from McAfee.

  • January 22, 2007 22 Jan'07

    MP slams slow payment of tax credit IT compensation

    The biggest compensation deal agreed between the government and a computer supplier - over tax credit IT problems - will, at the present rate of payment, take US company EDS more than 100 years to pay off in full.

  • January 22, 2007 22 Jan'07

    EMC and Ibrix elbow out Panasas at Disney Studios

    Disney needed a storage overhaul fast after merging with Pixar and making major changes to its upcoming new movie.

  • January 18, 2007 18 Jan'07

    ID theft victim to TJX customers: Mind your data

    Customers should guard their own data, says one ID theft victim. Meanwhile, some in the banking industry say TJX may have stored more data than necessary.

  • January 18, 2007 18 Jan'07

    Can Caller ID on VoIP calls be customized?

    Can I create the CID, name, area code and phone number that will display when I place a call via VoIP? Who do you like for VoIP service?

  • January 18, 2007 18 Jan'07

    What considerations do I need to make when setting up a VoIP system to our remote office?

    What considerations do I need to make when setting up a VoIP system to our remote office?

CIO
Security
Networking
Data Center
Data Management
Close