News

News Archive

  • January 02, 2007 02 Jan'07

    Security pros grumble over spam increase

    Spim and spam from unexpected sources is challenging enterprises in 2007. Some enterprises are taking action.

  • January 02, 2007 02 Jan'07

    Storage Outlook '07: In search of better data management

    Brian Peterson, storage architect for a Midwest-based Fortune 100 company, says better data management and business processes will be the main goal in 2007.

  • December 26, 2006 26 Dec'06

    Looking back at information security in 2006

    In this special edition of Security Wire Weekly, senior news writer Bill Brenner reviews his top interviews of 2006.

  • December 25, 2006 25 Dec'06

    Top 10 storage stories of 2006

    SAN and NAS converged and shook up the industry, iSCSI went mission-critical, users conquered tiered storage and more.

  • December 21, 2006 21 Dec'06

    Skype Trojan: Much ado about nothing?

    This week in Security Blog Log: A Trojan horse has captured headlines by targeting Skype users. But some believe the threat is being blown out of proportion.

  • December 21, 2006 21 Dec'06

    Microsoft investigates Windows Vista flaw

    Local users could gain elevated system privileges and run malicious commands by exploiting an error within the Windows server library. Vista is among the OS versions affected.

  • December 20, 2006 20 Dec'06

    Top 10 storage acquisitions of 2006

    Industry consolidation was fast and furious this year. We rank the deals by quality, not quantity.

  • December 20, 2006 20 Dec'06

    Seagate to acquire EVault for $185M

    The disk drive maker has plans to tuck the online backup and archiving service provider into its services group.

  • December 19, 2006 19 Dec'06

    Microsoft releases Vista APIs to security vendors

    Microsoft released a draft set of programming interfaces allowing security vendors to develop software using the Windows kernel on 64-bit systems.

  • December 19, 2006 19 Dec'06

    Mozilla fixes multiple Firefox flaws

    Digital miscreants could exploit flaws in Mozilla's popular Firefox browser to bypass security programs, access sensitive information and conduct cross-site scripting attacks.

  • December 19, 2006 19 Dec'06

    Check Point gets big IDS boost from NFR deal

    Analysts say Check Point would gain much-needed intrusion detection and prevention capabilities through its acquisition of NFR Security. The deal should erase bad memories of the aborted Sourcefire deal.

  • December 18, 2006 18 Dec'06

    VoIP hacking exposed in new book

    VoIP hacking is a reality, and in a new book, two VoIP security experts outline the tools and tricks to avoid a system-crushing hack.

  • December 18, 2006 18 Dec'06

    Cisco WLAN design best practices

    Wireless LAN (WLAN) technology has built-in security features, but a one-size-fits-all approach won't ensure adequate security for your organization. This tip provides best practices for designing your security architecture, including user community...

  • December 18, 2006 18 Dec'06

    WLAN interference and clogged pipes -- happy holidays!

    WLAN interference caused by decorations and slowed traffic due to online shopping are just some of the network woes of the holidays.

  • December 17, 2006 17 Dec'06

    Criminals find safety in cyberspace

    A new report from McAfee shows how criminals are enjoying a sense of safety and anonymity in cyberspace that they never had on the street. And they're making more money.

  • December 17, 2006 17 Dec'06

    Top 10 VoIP tips of 2006

    Echo and latency issues top the list in 2006, as seen in our top 10 list of most popular tips. If you have missed any of these tips, now is the time to catch up before the end of the year.

  • December 17, 2006 17 Dec'06

    NAS gateway purchase considerations

    NAS gateways overcome the inherent limitations of scale and flexibility by utilizing externally connected storage as external standalone disk arrays. NAS storage capacity is typically expanded by simply adding more disks to the appliance, but this ...

  • December 15, 2006 15 Dec'06

    Cardiff launches intelligent document system

    Cardiff, a division of Autonomy Corporation, has launched a new system to allow firms to get more out of their on-screen documents.

  • December 14, 2006 14 Dec'06

    Employers to seek more security talent in '07

    Learn what certifications are growing in demand and how employers are looking at the job market in 2007.

  • December 14, 2006 14 Dec'06

    NAS gateway specifications

    A NAS gateway offers file-based accesses to external storage on a disk array -- or a SAN, where users can take advantage of superior performance and reliability while maintaining a level of simplicity. Since storage is moved off of the NAS device, ...

  • December 14, 2006 14 Dec'06

    Schneier: Data breach at UCLA barely newsworthy

    This week in Security Blog Log: Security luminary Bruce Schneier and others sound off on the UCLA data breach that exposed 800,000 people to identity fraud.

  • December 13, 2006 13 Dec'06

    Review: Sky's the limit with Skybox View 3.0

    Hot Pick: Skybox View 3.0 offers a unique and flexible approach for assessing and managing specific threats and overall risk to your digital assets.

  • December 13, 2006 13 Dec'06

    Hosted VoIP eliminates cost, complexity

    Hosted VoIP is being adopted at increasing rates as more and more companies look to avoid the excess costs and complexities of on-premise solutions.

  • December 13, 2006 13 Dec'06

    Third zero-day found in Microsoft Word

    For the third time in a week, a zero-day flaw has been found in Microsoft Word. Users should be cautious when opening attachments from unknown sources.

  • December 13, 2006 13 Dec'06

    Host-based replication

    While the lines of distinction among data protection technologies such as backup, continuous data protection and replication have blurred, host-based replication can play a key role in your overall data protection strategy.

  • December 13, 2006 13 Dec'06

    VoIP management tools: Calculating ROI

    Before purchasing management tools for VoIP, you may need to calculate the return on investment (ROI) to justify the cost of those tools. In this tip, Gary Audin explains how to calculate ROI and provides specific checklists for calculating the ROI ...

  • December 13, 2006 13 Dec'06

    Hosted VoIP eliminates cost, complexity

    Hosted VoIP is being adopted at increasing rates as more and more companies look to avoid the excess costs and complexities of on-premise solutions.

  • December 13, 2006 13 Dec'06

    Sun updates Java Standard Edition

    Sun Microsystems has launched version six of its Java Standard Edition platform, which supports the integration of Java technology with other programming languages

  • December 13, 2006 13 Dec'06

    Eclipse adoption rate on the increase

    The adoption rate of the open source Eclipse integrated development environment has more than doubled in Europe, the Middle East and Africa, industry analysts have revealed.

  • December 13, 2006 13 Dec'06

    Swindon is broadband capital

    Swindon is still the broadband capital of Britain, research on coverage has revealed.

  • December 12, 2006 12 Dec'06

    Mixing SAS and SATA disk drives can cause problems

    Mixing SAS and SATA disk drives in the same enclosure can cause interoperability issues, but vendors are finding workarounds.

  • December 12, 2006 12 Dec'06

    Expert offers tips to bolster messaging security

    In this edition of Security Wire Weekly, Burton Group analyst Diana Kelley explains how to lock down messaging programs as part of our three-day special report on the subject.

  • December 12, 2006 12 Dec'06

    Symantec issues NetBackup security alert

    Symantec issues an alert and patch to vulnerabilities in NetBackup 6.0, 5.1 and 5.0.

  • December 12, 2006 12 Dec'06

    Data breach at Boeing exposes 382,000 employees

    The third theft of a Boeing laptop in the last 13 months has exposed the data of nearly 400,000 employees and retirees.

  • December 11, 2006 11 Dec'06

    Storage Decisions Session Downloads: Executive Track (LV 2006)

    Our "Executive track" sessions give C-level technology executivesan idea of where their storage should be and ideas on where it's headed.

  • December 11, 2006 11 Dec'06

    Microsoft fixes two zero-day flaws

    The December security update from Microsoft includes patches for zero-day flaws in Visual Studio and Windows Media Player, but two zero-day flaws in Word remain unfixed.

  • December 11, 2006 11 Dec'06

    IT pros look for ways to lock down IM

    Special Report: To control growing IM threats, administrators are trying to limit which programs can be used or ban the technology altogether. But that's not always possible.

  • December 11, 2006 11 Dec'06

    Vendors to crank up SaaS offerings to SMBs next year

    SMBs will outpace enterprises when it comes to IT spending in 2007 -- and vendors will delve deeper into SaaS to reach them.

  • December 11, 2006 11 Dec'06

    SIP desktop phone blends functionality, style

    VoIP desktop phones are no longer the clunky hunks of plastic that take up space on your desk. Siemens yesterday launched a new family of SIP phones that are as slick as they are functional.

  • December 10, 2006 10 Dec'06

    Zantaz buys data classification partner Singlecast

    Email archiving player Zantaz has purchased data classification startup Singlecast, which can categorise and apply policies to data before an email takes up storage space.

  • December 10, 2006 10 Dec'06

    Inside the numbers: Messaging (in)security

    In August, SearchSecurity.com surveyed 250 IT pros from a variety of industries about messaging security programs. Here are some of the questions we asked and their responses.

  • December 10, 2006 10 Dec'06

    Hitachi, BlueArc announce OEM partnership

    What had been rumored to be an acquisition has turned out to be an OEM deal, but HDS has also made an investment in BlueArc, indicating an acquisition could be the next step.

  • December 10, 2006 10 Dec'06

    Messaging insecurity fuels data leakage fears

    Special Report: The proliferation of messaging technology means more opportunity for malware to take root and sensitive data to be lifted.

  • December 10, 2006 10 Dec'06

    Microsoft suffers third zero-day in a week

    A second zero-day flaw in Word has been uncovered, Microsoft said Sunday. It's the software giant's third zero-day in a week.

  • December 10, 2006 10 Dec'06

    Storage Decisions in the wild, wild west

    Dedupe, iSCSI, backup, virtualisation and cowboys in Stetson hats -- Storage Decisions Las Vegas 2006 had it all.

  • December 10, 2006 10 Dec'06

    Windows Vista security settings

    Microsoft's Windows Vista is here. Here, Current Analysis senior analyst Andrew Braunberg discusses what network admins need to know about tightening up Vista security.

  • December 09, 2006 09 Dec'06

    Storage IQ: Key technologies for 2006

    We keep a close eye on what technologies our readers are most interested in. Here are the year's 25 most commonly searched terms. Do you know them all?

  • December 07, 2006 07 Dec'06

    Dell, Microsoft tout joint NAS product

    The new NX1950 product is vastly more expensive than its counterparts from HP and NetApp, but it scales higher, supports clusters and has redundant controllers.

  • December 07, 2006 07 Dec'06

    NAS management software specifications

    Network attached storage (NAS) appliances and gateways must be configured and managed using NAS management software that allows administrators to allocate space, manage RAID and storage behaviors, perform routine maintenance, and other tasks. ...

  • December 06, 2006 06 Dec'06

    Microsoft to fix Visual Studio, Windows flaws

    Microsoft plans to release five security updates to address vulnerabilities in Windows and a flaw in Visual Studio as part of its monthly security bulletin release cycle.

CIO
Security
Networking
Data Center
Data Management
Close