News
News Archive
-
January 03, 2007
03
Jan'07
Asterisk releases new software appliance
Asterisk, the open source PBX, yesterday released a new software appliance that it says can be implemented in 30 minutes or less.
-
January 03, 2007
03
Jan'07
Information security market 2006 year in review
In part two of our two-part special edition of Security Wire Weekly, site editor Eric Parizo reveals his picks for top information security interviews of 2006. Audio clips in this program include Andrew Braunberg of Current Analysis; Johannes ...
-
January 02, 2007
02
Jan'07
Security pros grumble over spam increase
Spim and spam from unexpected sources is challenging enterprises in 2007. Some enterprises are taking action.
-
January 02, 2007
02
Jan'07
Storage Outlook '07: In search of better data management
Brian Peterson, storage architect for a Midwest-based Fortune 100 company, says better data management and business processes will be the main goal in 2007.
-
December 26, 2006
26
Dec'06
Looking back at information security in 2006
In this special edition of Security Wire Weekly, senior news writer Bill Brenner reviews his top interviews of 2006.
-
December 25, 2006
25
Dec'06
Top 10 storage stories of 2006
SAN and NAS converged and shook up the industry, iSCSI went mission-critical, users conquered tiered storage and more.
-
December 21, 2006
21
Dec'06
Skype Trojan: Much ado about nothing?
This week in Security Blog Log: A Trojan horse has captured headlines by targeting Skype users. But some believe the threat is being blown out of proportion.
-
December 21, 2006
21
Dec'06
Microsoft investigates Windows Vista flaw
Local users could gain elevated system privileges and run malicious commands by exploiting an error within the Windows server library. Vista is among the OS versions affected.
-
December 20, 2006
20
Dec'06
Top 10 storage acquisitions of 2006
Industry consolidation was fast and furious this year. We rank the deals by quality, not quantity.
-
December 20, 2006
20
Dec'06
Seagate to acquire EVault for $185M
The disk drive maker has plans to tuck the online backup and archiving service provider into its services group.
-
December 19, 2006
19
Dec'06
Microsoft releases Vista APIs to security vendors
Microsoft released a draft set of programming interfaces allowing security vendors to develop software using the Windows kernel on 64-bit systems.
-
December 19, 2006
19
Dec'06
Mozilla fixes multiple Firefox flaws
Digital miscreants could exploit flaws in Mozilla's popular Firefox browser to bypass security programs, access sensitive information and conduct cross-site scripting attacks.
-
December 19, 2006
19
Dec'06
Check Point gets big IDS boost from NFR deal
Analysts say Check Point would gain much-needed intrusion detection and prevention capabilities through its acquisition of NFR Security. The deal should erase bad memories of the aborted Sourcefire deal.
-
December 18, 2006
18
Dec'06
VoIP hacking exposed in new book
VoIP hacking is a reality, and in a new book, two VoIP security experts outline the tools and tricks to avoid a system-crushing hack.
-
December 18, 2006
18
Dec'06
Cisco WLAN design best practices
Wireless LAN (WLAN) technology has built-in security features, but a one-size-fits-all approach won't ensure adequate security for your organization. This tip provides best practices for designing your security architecture, including user community...
-
December 18, 2006
18
Dec'06
WLAN interference and clogged pipes -- happy holidays!
WLAN interference caused by decorations and slowed traffic due to online shopping are just some of the network woes of the holidays.
-
December 17, 2006
17
Dec'06
Criminals find safety in cyberspace
A new report from McAfee shows how criminals are enjoying a sense of safety and anonymity in cyberspace that they never had on the street. And they're making more money.
-
December 17, 2006
17
Dec'06
Top 10 VoIP tips of 2006
Echo and latency issues top the list in 2006, as seen in our top 10 list of most popular tips. If you have missed any of these tips, now is the time to catch up before the end of the year.
-
December 17, 2006
17
Dec'06
NAS gateway purchase considerations
NAS gateways overcome the inherent limitations of scale and flexibility by utilizing externally connected storage as external standalone disk arrays. NAS storage capacity is typically expanded by simply adding more disks to the appliance, but this ...
-
December 15, 2006
15
Dec'06
Cardiff launches intelligent document system
Cardiff, a division of Autonomy Corporation, has launched a new system to allow firms to get more out of their on-screen documents.
-
December 14, 2006
14
Dec'06
Employers to seek more security talent in '07
Learn what certifications are growing in demand and how employers are looking at the job market in 2007.
-
December 14, 2006
14
Dec'06
NAS gateway specifications
A NAS gateway offers file-based accesses to external storage on a disk array -- or a SAN, where users can take advantage of superior performance and reliability while maintaining a level of simplicity. Since storage is moved off of the NAS device, ...
-
December 14, 2006
14
Dec'06
Schneier: Data breach at UCLA barely newsworthy
This week in Security Blog Log: Security luminary Bruce Schneier and others sound off on the UCLA data breach that exposed 800,000 people to identity fraud.
-
December 13, 2006
13
Dec'06
Review: Sky's the limit with Skybox View 3.0
Hot Pick: Skybox View 3.0 offers a unique and flexible approach for assessing and managing specific threats and overall risk to your digital assets.
-
December 13, 2006
13
Dec'06
Hosted VoIP eliminates cost, complexity
Hosted VoIP is being adopted at increasing rates as more and more companies look to avoid the excess costs and complexities of on-premise solutions.
-
December 13, 2006
13
Dec'06
Third zero-day found in Microsoft Word
For the third time in a week, a zero-day flaw has been found in Microsoft Word. Users should be cautious when opening attachments from unknown sources.
-
December 13, 2006
13
Dec'06
Host-based replication
While the lines of distinction among data protection technologies such as backup, continuous data protection and replication have blurred, host-based replication can play a key role in your overall data protection strategy.
-
December 13, 2006
13
Dec'06
VoIP management tools: Calculating ROI
Before purchasing management tools for VoIP, you may need to calculate the return on investment (ROI) to justify the cost of those tools. In this tip, Gary Audin explains how to calculate ROI and provides specific checklists for calculating the ROI ...
-
December 13, 2006
13
Dec'06
Hosted VoIP eliminates cost, complexity
Hosted VoIP is being adopted at increasing rates as more and more companies look to avoid the excess costs and complexities of on-premise solutions.
-
December 13, 2006
13
Dec'06
Sun updates Java Standard Edition
Sun Microsystems has launched version six of its Java Standard Edition platform, which supports the integration of Java technology with other programming languages
-
December 13, 2006
13
Dec'06
Eclipse adoption rate on the increase
The adoption rate of the open source Eclipse integrated development environment has more than doubled in Europe, the Middle East and Africa, industry analysts have revealed.
-
December 13, 2006
13
Dec'06
Swindon is broadband capital
Swindon is still the broadband capital of Britain, research on coverage has revealed.
-
December 12, 2006
12
Dec'06
Mixing SAS and SATA disk drives can cause problems
Mixing SAS and SATA disk drives in the same enclosure can cause interoperability issues, but vendors are finding workarounds.
-
December 12, 2006
12
Dec'06
Expert offers tips to bolster messaging security
In this edition of Security Wire Weekly, Burton Group analyst Diana Kelley explains how to lock down messaging programs as part of our three-day special report on the subject.
-
December 12, 2006
12
Dec'06
Symantec issues NetBackup security alert
Symantec issues an alert and patch to vulnerabilities in NetBackup 6.0, 5.1 and 5.0.
-
December 12, 2006
12
Dec'06
Data breach at Boeing exposes 382,000 employees
The third theft of a Boeing laptop in the last 13 months has exposed the data of nearly 400,000 employees and retirees.
-
December 11, 2006
11
Dec'06
Storage Decisions Session Downloads: Executive Track (LV 2006)
Our "Executive track" sessions give C-level technology executivesan idea of where their storage should be and ideas on where it's headed.
-
December 11, 2006
11
Dec'06
Microsoft fixes two zero-day flaws
The December security update from Microsoft includes patches for zero-day flaws in Visual Studio and Windows Media Player, but two zero-day flaws in Word remain unfixed.
-
December 11, 2006
11
Dec'06
IT pros look for ways to lock down IM
Special Report: To control growing IM threats, administrators are trying to limit which programs can be used or ban the technology altogether. But that's not always possible.
-
December 11, 2006
11
Dec'06
Vendors to crank up SaaS offerings to SMBs next year
SMBs will outpace enterprises when it comes to IT spending in 2007 -- and vendors will delve deeper into SaaS to reach them.
-
December 11, 2006
11
Dec'06
SIP desktop phone blends functionality, style
VoIP desktop phones are no longer the clunky hunks of plastic that take up space on your desk. Siemens yesterday launched a new family of SIP phones that are as slick as they are functional.
-
December 10, 2006
10
Dec'06
Zantaz buys data classification partner Singlecast
Email archiving player Zantaz has purchased data classification startup Singlecast, which can categorise and apply policies to data before an email takes up storage space.
-
December 10, 2006
10
Dec'06
Inside the numbers: Messaging (in)security
In August, SearchSecurity.com surveyed 250 IT pros from a variety of industries about messaging security programs. Here are some of the questions we asked and their responses.
-
December 10, 2006
10
Dec'06
Hitachi, BlueArc announce OEM partnership
What had been rumored to be an acquisition has turned out to be an OEM deal, but HDS has also made an investment in BlueArc, indicating an acquisition could be the next step.
-
December 10, 2006
10
Dec'06
Messaging insecurity fuels data leakage fears
Special Report: The proliferation of messaging technology means more opportunity for malware to take root and sensitive data to be lifted.
-
December 10, 2006
10
Dec'06
Microsoft suffers third zero-day in a week
A second zero-day flaw in Word has been uncovered, Microsoft said Sunday. It's the software giant's third zero-day in a week.
-
December 10, 2006
10
Dec'06
Storage Decisions in the wild, wild west
Dedupe, iSCSI, backup, virtualisation and cowboys in Stetson hats -- Storage Decisions Las Vegas 2006 had it all.
-
December 10, 2006
10
Dec'06
Windows Vista security settings
Microsoft's Windows Vista is here. Here, Current Analysis senior analyst Andrew Braunberg discusses what network admins need to know about tightening up Vista security.
-
December 09, 2006
09
Dec'06
Storage IQ: Key technologies for 2006
We keep a close eye on what technologies our readers are most interested in. Here are the year's 25 most commonly searched terms. Do you know them all?
-
December 07, 2006
07
Dec'06
Dell, Microsoft tout joint NAS product
The new NX1950 product is vastly more expensive than its counterparts from HP and NetApp, but it scales higher, supports clusters and has redundant controllers.