News

News Archive

  • May 24, 2007 24 May'07

    Microsoft investigates new Office zero-day flaw

    Attackers could exploit a newly-discovered zero-day flaw in Office 2000 to run malicious code on targeted machines, Symantec warned.

  • May 24, 2007 24 May'07

    Cisco, EMC partner on SAN encryption

    Cisco will ship encryption in switches later this year integrated with EMC's RSA key management software. Users are curious but cautious about its impact on other services.

  • May 22, 2007 22 May'07

    Mitel acquires Inter-Tel, signaling more consolidation to come

    Mitel acquired Inter-Tel last week, signaling a trend toward vendor consolidation in the VoIP market and creating stronger options for SMBs.

  • May 22, 2007 22 May'07

    Microsoft unveils unified communications devices

    Microsoft unveils unified communications devices.

  • May 22, 2007 22 May'07

    Selling network certification: How to talk up your credentials to current and future employers

    Network certification has its benefits, but certification alone no longer guarantees employment. In this tip, learn how to justify your credentials' value.

  • May 21, 2007 21 May'07

    Cisco warns of new IOS flaws

    The new flaws are classified as "low," but if exploited they could result in a sustained DoS condition, Cisco said.

  • May 21, 2007 21 May'07

    EMC users push for better power consumption

    EMC announces a 1.8 PB VTL, deduplication for VMware and bare-metal restore for servers as users caution the company to stay focused on everyday problems, such as power consumption.

  • May 21, 2007 21 May'07

    Mobile instant messaging enhances company's business processes

    A mobile IM service acquired by a hosted VoIP provider encourages more companies to enhance their business processes.

  • May 21, 2007 21 May'07

    Microsoft, TCG partner on network access control; Cisco takes own route

    Microsoft and the Trusted Computing Group (TCG) have joined forces to create better interoperability between network access control solutions with the announcement of a new specification which ensures that Microsoft's Network Access Protection (NAP)...

  • May 20, 2007 20 May'07

    Learn NetStar's secret to success

    NetStar is a systems integrator and managed service provider and also a survivor of the dot.com crash. The company secured venture capital funding way back at the turn of the century and has put the money to good use, eschewing the ebony ...

  • May 17, 2007 17 May'07

    VoIP security fundamentals

    VoIP security is a challenge for IT staff because IP telephony brings with it not only the security problems of data networks but also new threats specific to VoIP. In this fundamentals guide, learn about network security threats and emerging IP ...

  • May 16, 2007 16 May'07

    Screencast: How to configure a UTM device

    In this exclusive screencast, expert David Strom demonstrates the configuration options available in SonicWall's unified threat management product.

  • May 16, 2007 16 May'07

    When signature based antivirus isn't enough

    Zero-day exploits, targeted attacks and increasing demands for endpoint application controls are driving the rapid metamorphosis from signature-based antivirus and antispyware to HIPS-based integrated products.

  • May 11, 2007 11 May'07

    Choosing WAN providers: Key questions to ask

    When evaluating carrier services for the WAN, it's imperative to ask some key questions regarding customer service, service-level agreements, global coverage, management and monitoring capabilities, and underlying technologies. Make sure these ...

  • May 11, 2007 11 May'07

    Cisco fixes fresh flaws in IOS

    Attackers could exploit two flaws in Cisco's IOS to cause a denial of service or tamper with data in a device file system.

  • May 11, 2007 11 May'07

    VoIP, unified communications adoption continue to rise

    VoIP and unified communications adoption continue to rise steadily in the enterprise, according to Infonetics Research's latest report.

  • May 10, 2007 10 May'07

    EMC buys Indigo Stone for bare-metal restore

    EMC has been hush-hush about adding Indigo Stone, a bare-metal restore software company, to its stack of acquisitions.

  • May 09, 2007 09 May'07

    Symantec fixes flaws in Norton, pcAnywhere

    Attackers could exploit flaws in Symantec's Norton AntiVirus and pcAnywhere to launch malicious code or compromise a user's session credentials.

  • May 08, 2007 08 May'07

    Companies plug FTP holes with secure FTP servers

    Some companies are investing in secure FTP suites to give employees and business partners the ability to transfer large files such as large documents, audio, video and photos.

  • May 08, 2007 08 May'07

    What top five subjects does the CCNA test focus on?

    Know what subjects are tested most heavily on in the CCNA exam. Use this top five list from Cisco certifications expert Dave Minutella in this response.

  • May 08, 2007 08 May'07

    ISCSI TCP/IP TOE card specifications

    One means of improving iSCSI traffic performance is to include TOE (TCI/IP Offload Engine) capability on the Ethernet card itself. An iSCSI TOE allows the network adapter to process iSCSI traffic (often all Ethernet LAN traffic) locally -- relieving...

  • May 07, 2007 07 May'07

    Is RAID in general an obsolete technology today?

    This is a technology that is so commonly used, so transparent, that we really don't even think about it...

  • May 07, 2007 07 May'07

    What are the most important new disk drive technologies?

    The first 1 terabyte hard disk drives have appeared. What will be the impact of hard disk drive technologies such as perpendicular recording, 2.5-inch high-performance drives, secure erase, encryption and hybrid technology drives?

  • May 06, 2007 06 May'07

    Intransa launches 10 GigE IP SAN

    Intransa is now shipping a standalone 10 GigE system, but it may take a while for applications and operating systems to be ready for the big pipe.

  • May 03, 2007 03 May'07

    Quiz: Preventing data leaks

    A six-question multiple-choice quiz to test your understanding of the content presented by expert Richard Bejtlich in this lesson of SearchSecurity.com's Data Protection Security School.

  • May 03, 2007 03 May'07

    Quiz: Enterprise strategies for protecting data at rest

    A five-question multiple-choice quiz to test your understanding of the e-discovery content presented by expert Perry Carpenter in this lesson of SearchSecurity.com's Data Protection Security School.

  • May 03, 2007 03 May'07

    Quiz: Demystifying data encryption

    A five-question multiple-choice quiz to test your understanding of the data encryption content presented by expert Tom Bowers in this lesson of SearchSecurity.com's Data Protection Security School.

  • May 03, 2007 03 May'07

    Network waste to reach $100 billion

    Network overspending will cost enterprises more than $100 billion over the next five years, according to recent predictions by Gartner Inc.

  • May 03, 2007 03 May'07

    Microsoft users sticking with third-party security vendors

    IT pros are pleased with Microsoft's security advances, including those found in Forefront. But don't expect them to drop their third-party security vendors.

  • May 02, 2007 02 May'07

    Microsoft to release DNS patch Tuesday

    In addition to a fix for the DNS Server Service flaw, Microsoft plans to patch critical flaws in Windows, Office, Exchange, CAPICOM and BizTalk.

  • May 01, 2007 01 May'07

    IM slang glossary

  • April 29, 2007 29 Apr'07

    WEP: Wireless security's broken skeleton in the closet

    WEP for wireless security was cracked again recently. Though many will say WEP is obsolete, many companies still use it.

  • April 26, 2007 26 Apr'07

    New image spam sneaks into inboxes

    Researchers at Secure Computing Corp. have discovered a new form of image spam that is sneaking into corporate systems and clogging inboxes.

  • April 26, 2007 26 Apr'07

    Websense to acquire SurfControl

    Websense says its planned $400 million acquisition of SurfControl will allow it to better compete in the global security market.

  • April 25, 2007 25 Apr'07

    NetApp VP says storage virtualization overrated

    NetApp's vice president of emerging products, Jay Kidd, discusses storage virtualization, competition with Isilon and NetApp's current identity crisis.

  • April 24, 2007 24 Apr'07

    Scaling storage networks demands careful consideration

    In the Fibre Channel world, scaling often means adding more and faster switch ports to extend the fabric's bandwidth and connectivity. But IP storage (mainly iSCSI) is a growing area of SAN expansion, using ubiquitous Ethernet network technology to ...