News

News Archive

  • January 18, 2007 18 Jan'07

    How can click-to-dial (click-to-call) be enabled at remote offices?

    We've just installed Mitel 3300's across three sites and are looking to complete click-to-dial (click-to-call) for users utilizing Outlook 2003. The calls will then be pushed out via a 5340 handset. We can achieve this locally from our main site, ...

  • January 18, 2007 18 Jan'07

    WAN/WAFS platform specifications

    Product snapshots highlighting key specifications for a cross section of WAFS and WAN optimisation products intended for small, medium, and large organisations.

  • January 17, 2007 17 Jan'07

    Data breach at TJX could affect millions

    Retailer TJX Companies said a hacker gained access to its systems exposing the credit card data of millions of customers.

  • January 17, 2007 17 Jan'07

    Companies take IM threats seriously

    Wesabe is a brand new money management community. It takes threats to IM as seriously as those targeting email and web applications

  • January 17, 2007 17 Jan'07

    Did TJX take the right steps after data breach?

    Security experts are mixed on whether TJX acted properly following a massive data breach last month. One expert says potential victims should have been notified sooner.

  • January 17, 2007 17 Jan'07

    Reasons why enterprise networking and security roles must stay separate

    Enterprise network managers are responsible for configuring and managing network devices, but should they be accountable for tasks that are typically handled by the information security team? Contributor Shon Harris examines why networking and ...

  • January 17, 2007 17 Jan'07

    VoIP security testing fundamentals

    VoIP security testing fundamentals are discussed in this guide -- how to test a VoIP system, what tools to use, how to use fuzzing to test VoIP security.

  • January 16, 2007 16 Jan'07

    Fortify Software to acquire Secure Software

    The acquisition of Secure Software will allow Fortify to expand into the requirements and design phases of the software development lifecycle, the company said.

  • January 16, 2007 16 Jan'07

    Routing: Five common, easily avoided errors

    Router configuration errors don''t have to take down your network. Learn five common routing mistakes -- and how to avoid them -- in this tip.

  • January 16, 2007 16 Jan'07

    Network security threats and answers, by industry

    Michael Gregg offers network pros in various industries security advice and step-by-step solutions to help lock down the network.

  • January 15, 2007 15 Jan'07

    Core Security offers powerful testing tool

    We highly recommend Core Impact 6.0 to security engineers to verify the vulnerability of their networks.

  • January 15, 2007 15 Jan'07

    Apere's IMAG 500 a tough sell

    Product review: Apere says many of the issues we encountered are addressed in its next release, but mid-enterprise businesses may not have the tolerance for this product.

  • January 14, 2007 14 Jan'07

    EMC, NetApp execs debate future of iSCSI

    A discussion between an EMC and NetApp executive, via their blogs, has users and analysts debating: Will the "Year of iSCSI" ever really happen?

  • January 14, 2007 14 Jan'07

    Storage management software finalists

    Find out who was selected as finalists in the storage management software category for our storage products of the year

CIO
Security
Networking
Data Center
Data Management
Close