News
News Archive
-
January 17, 2007
17
Jan'07
VoIP security testing fundamentals
VoIP security testing fundamentals are discussed in this guide -- how to test a VoIP system, what tools to use, how to use fuzzing to test VoIP security.
-
January 16, 2007
16
Jan'07
Fortify Software to acquire Secure Software
The acquisition of Secure Software will allow Fortify to expand into the requirements and design phases of the software development lifecycle, the company said.
-
January 16, 2007
16
Jan'07
Routing: Five common, easily avoided errors
Router configuration errors don''t have to take down your network. Learn five common routing mistakes -- and how to avoid them -- in this tip.
-
January 16, 2007
16
Jan'07
Network security threats and answers, by industry
Michael Gregg offers network pros in various industries security advice and step-by-step solutions to help lock down the network.
-
January 15, 2007
15
Jan'07
Core Security offers powerful testing tool
We highly recommend Core Impact 6.0 to security engineers to verify the vulnerability of their networks.
-
January 15, 2007
15
Jan'07
Apere's IMAG 500 a tough sell
Product review: Apere says many of the issues we encountered are addressed in its next release, but mid-enterprise businesses may not have the tolerance for this product.
-
January 14, 2007
14
Jan'07
EMC, NetApp execs debate future of iSCSI
A discussion between an EMC and NetApp executive, via their blogs, has users and analysts debating: Will the "Year of iSCSI" ever really happen?
-
January 14, 2007
14
Jan'07
Storage management software finalists
Find out who was selected as finalists in the storage management software category for our storage products of the year
-
January 11, 2007
11
Jan'07
Oracle emulates Microsoft with advance patch notice
Oracle will patch 52 security flaws across its product line Tuesday, according to its inaugural CPU advance notification bulletin.
-
January 11, 2007
11
Jan'07
Network security -- Taking the layered approach
Network security is tricky business. In his new book Hack the Stack, author and security expert Michael Gregg outlines how to secure the network using the OSI model.
-
January 10, 2007
10
Jan'07
Out-of-cycle Microsoft patch likely, experts say
Patch specialists and IT administrators were surprised Microsoft didn't fix much-publicised Word zero-day flaws Tuesday. But they don't fault the company for holding back.
-
January 10, 2007
10
Jan'07
Sophos acquires Endforce to add NAC
Antivirus vendor Sophos is rounding out its email Web and desktop security software with Endforce's network access control (NAC) software.
-
January 10, 2007
10
Jan'07
Colonial Williamsburg virtualizes with Acopia
The living history museum is designed to show customers the 18th century, but behind the scenes, the business is implementing tiered storage using 21st-century file virtualization.
-
January 10, 2007
10
Jan'07
Critical Apple flaw discovered in Mac OS X
Attackers can exploit the flaw remotely to compromise a user's system via the Safari Web browser.
-
January 09, 2007
09
Jan'07
More users increase risk for Volkswagen AG
With 1.5 million users on the network, Volkswagen AG depends more than ever on strong ID and access management to safeguard intellectual property, according to its CISO.
-
January 09, 2007
09
Jan'07
Remote flaw in Vista could earn finder $8,000
VeriSign Inc.'s iDefense Labs is offering an $8,000 bounty to any researcher who finds a remotely exploitable flaw in Windows Vista.
-
January 09, 2007
09
Jan'07
Network configuration management key to VoIP success
While companies spend millions on upgrading infrastructure for VoIP, little attention is given to solving the largest source of downtime – configuration-related outages due to human error.
-
January 09, 2007
09
Jan'07
Network configuration management key to VoIP success
While companies spend millions on upgrading infrastructure for VoIP, little attention is given to solving the largest source of downtime – configuration-related outages due to human error. A well-defined change management process built around a ...
-
January 09, 2007
09
Jan'07
EMC restructures SMB storage division
EMC's Insignia group, originally a separate business unit, has seen layoffs and a restructuring, but EMC says it has no plans to discontinue its SMB products.
-
January 08, 2007
08
Jan'07
Is an SMB environment too small for a SAN?
Almost any size business can benefit from some type of SAN -- or "network storage"; whether it's NAS, iSCSI-based IP storage or FC storage...
-
January 08, 2007
08
Jan'07
What is the difference between virtualization switches and virtual SANs?
The word "virtualization" is thrown around so much that it's hard to always know what it means...
-
January 08, 2007
08
Jan'07
What is the difference between InfiniBand, SAS and iSCSI and where does each technology fit?
InfiniBand is an interface; just like Fibre Channel (FC) or Ethernet. As an interface, InfiniBand carries different protocols...
-
January 08, 2007
08
Jan'07
How far apart can SAN locations be?
Storage locations can potentially be very far apart, separated by thousands of miles, even around the globe. The real consideration in selecting distance is that of latency...
-
January 08, 2007
08
Jan'07
What is the difference between SAN routing, channel extension and virtualization?
Some folks see SAN routing as just segmentation; some see it as protocol conversion; some see it as distance enablement. SAN routing really embraces all those...
-
January 08, 2007
08
Jan'07
What has been the impact of storage virtualization on SAN deployments?
I really have not seen storage virtualization driving storage area network (SAN) deployment...
-
January 08, 2007
08
Jan'07
Critical fixes for Excel, Outlook and Windows
Microsoft starts the year with security updates for Excel, Outlook and Windows. Three of the fixes are rated critical.
-
January 08, 2007
08
Jan'07
Convergence, interoperability key in disaster planning
Convergence and interoperability are major factors in ensuring communications continuity in a disaster.
-
January 08, 2007
08
Jan'07
Attackers hide malicious code using new method
Attackers have designed a new way to thwart virus signatures from antivirus vendors, says a new report.
-
January 08, 2007
08
Jan'07
How are switches changing the way SANs are designed and managed?
There is more granularity in the device options today, allowing for more versatile device configuration...
-
January 08, 2007
08
Jan'07
What guidelines should our listeners use for oversubscribing or under subscribing?
Oversubscription has long been a contentious topic...
-
January 08, 2007
08
Jan'07
When should I use a SAN vs. NAS or iSCSI?
It's often a matter of block vs. file...
-
January 08, 2007
08
Jan'07
Storage area network FAQ audiocast
Don't have time to dig into the FAQ text now? Download the storage area network audiocast in MP3 format and listen in the car, at the gym -- wherever you want.
-
January 08, 2007
08
Jan'07
How does IP storage differ from iSCSI, NAS and Fibre Channel?
Generically, IP storage involves any storage functionality that is leveraging TCP/IP as a network transport...
-
January 08, 2007
08
Jan'07
What are some best practices when it comes to designing a SAN?
First, design for growth. Next, design for maintenance, which may include...
-
January 08, 2007
08
Jan'07
What's the difference between SONET/SDH, DWDM and OCx -- Why not just use TCP?
We live in a virtual world where most of us have network access in our homes -- the Internet -- which is a virtual network...
-
January 07, 2007
07
Jan'07
Brocade buys Silverback for 10 GigE acceleration chips
Adding another string to its bow, Brocade scoops up IP chip acceleration supplier Silverback Systems for an undisclosed sum.
-
January 07, 2007
07
Jan'07
Bug Briefs: OpenOffice vulnerable to attack
Other flaws were reported in Apple QuickTime, Mac OS X, Adobe Flash Player, VideoLAN VLC, the Opera Web browser, and Cisco Access Control Server.
-
January 07, 2007
07
Jan'07
Microsoft nixes four patch bulletins
Eight security updates were originally scheduled for Patch Tuesday , but Microsoft has decided to hold back on half of them.
-
January 07, 2007
07
Jan'07
NAC implementation slows as networking budgets grow
Network Access Control (NAC) implementations will decrease, despite growth in networking budgets.
-
January 04, 2007
04
Jan'07
Adobe Reader users urged to upgrade
Adobe Reader 8 fixes serious flaws attackers could exploit for cross-site scripting and other attacks.
-
January 03, 2007
03
Jan'07
Cisco bolsters security with IronPort buy
Cisco Systems agreed Thursday to buy Internet gateway security vendor IronPort Systems Inc. for $830 million.
-
January 03, 2007
03
Jan'07
Cisco software vulnerable to attack
Cisco's Clean Access software and Clean Access Manager are at risk to attack. A malicious user can access a database snapshot and download it without authentication.
-
January 03, 2007
03
Jan'07
Asterisk releases new software appliance
Asterisk, the open source PBX, yesterday released a new software appliance that it says can be implemented in 30 minutes or less.
-
January 03, 2007
03
Jan'07
Information security market 2006 year in review
In part two of our two-part special edition of Security Wire Weekly, site editor Eric Parizo reveals his picks for top information security interviews of 2006. Audio clips in this program include Andrew Braunberg of Current Analysis; Johannes ...
-
January 02, 2007
02
Jan'07
Security pros grumble over spam increase
Spim and spam from unexpected sources is challenging enterprises in 2007. Some enterprises are taking action.
-
January 02, 2007
02
Jan'07
Storage Outlook '07: In search of better data management
Brian Peterson, storage architect for a Midwest-based Fortune 100 company, says better data management and business processes will be the main goal in 2007.
-
December 26, 2006
26
Dec'06
Looking back at information security in 2006
In this special edition of Security Wire Weekly, senior news writer Bill Brenner reviews his top interviews of 2006.
-
December 25, 2006
25
Dec'06
Top 10 storage stories of 2006
SAN and NAS converged and shook up the industry, iSCSI went mission-critical, users conquered tiered storage and more.
-
December 21, 2006
21
Dec'06
Skype Trojan: Much ado about nothing?
This week in Security Blog Log: A Trojan horse has captured headlines by targeting Skype users. But some believe the threat is being blown out of proportion.
-
December 21, 2006
21
Dec'06
Microsoft investigates Windows Vista flaw
Local users could gain elevated system privileges and run malicious commands by exploiting an error within the Windows server library. Vista is among the OS versions affected.