News

News Archive

  • February 26, 2007 26 Feb'07

    Pilkington gets flexible with Infor

    Pilkington, the global glass manufacturer, is poised to go live with Infor software designed to predict demand for its auto-glass aftermarket, after the firm found the required level of functionality was not available in its core enterprise resource...

  • February 26, 2007 26 Feb'07

    Storm rages again: Self-morphing Trojan uses blogs to spread rootkits

    A new variant of the Storm Trojan that changes with each download is infecting blog sites with malicious URLs, intercepting traffic when visitors try to post comments.

  • February 25, 2007 25 Feb'07

    HP announces iSCSI VTL for SMBs

    HP's new iSCSI VTL devices include automated backup capabilities for users with fewer than four servers.

  • February 25, 2007 25 Feb'07

    Storage switch startup burns out, turns to security

    The company formerly known as Maxxan has been rechristened CipherMax and is now marketing a storage switch/encryption appliance with one point of management.

  • February 25, 2007 25 Feb'07

    PatchLink acquires STAT Guardian tool

    PatchLink says it will add more muscle to its vulnerability management portfolio by acquiring the STAT Guardian tool from IT vendor Harris Corp.

  • February 25, 2007 25 Feb'07

    IP PBX: Ten reasons to switch

    Should you throw out the old PBX and replace it with a new IP PBX? This tip from WindowsNetworking.com provides ten compelling reasons to do so.

  • February 25, 2007 25 Feb'07

    Does an organization have to have an IP PBX in order to have a unified communications system?

    Does an organization have to have an IP PBX in order to have a unified communications system?

  • February 25, 2007 25 Feb'07

    Gartner: Quad-core slowed 2006 server sales

    New Gartner data suggests that quad-core servers are not exciting users.

  • February 22, 2007 22 Feb'07

    Google offers 10 GB inbox

    The search engine giant is offering an email application on a subscription basis with five times the storage capacity of the free version.

  • February 21, 2007 21 Feb'07

    Cisco warns of IP phone flaws

    Attackers could circumvent security restrictions by exploiting flaws in certain Cisco IP phones, the networking giant warned Wednesday.

  • February 20, 2007 20 Feb'07

    Microsoft confirms new IE flaw

    Attackers could exploit a new flaw in Internet Explorer (IE) to access local files on targeted systems, Microsoft confirmed Tuesday.

  • February 20, 2007 20 Feb'07

    Cisco routers threatened by drive-by pharming

    Millions of Cisco routers in circulation could be compromised by a newly-discovered attack technique Symantec calls drive-by pharming, the networking giant warned in an advisory.

  • February 20, 2007 20 Feb'07

    Cisco to acquire Reactivity for $135 million

    One analyst says Cisco will benefit from Reactivity's policy and threat management capabilities.

  • February 20, 2007 20 Feb'07

    Google plugs dangerous flaw

    An attacker could exploit a hole in Google Desktop to gain access to users' personal files. Google has released a patch, but experts say not all users are receiving it.

  • February 20, 2007 20 Feb'07

    TJX data breach worse than initially feared

    Hackers had access to a larger amount of customer data, TJX executives said in a statement.

  • February 20, 2007 20 Feb'07

    All about automation

    Automating your IT operations is a trick that creates obvious benefits. In this article, we explain how data center automation can help an entire enterprise.

  • February 19, 2007 19 Feb'07

    Sourcefire fixes Snort flaw

    Attackers could exploit a flaw in the popular open source Snort IDS tool to cause a denial of service or launch malicious code.

  • February 19, 2007 19 Feb'07

    When security firms merge, some users are losers

    Some users see their services improve when IT security vendors merge with other companies or get acquired. Others say they've been left out in the cold.

  • February 19, 2007 19 Feb'07

    Quiz: Compliance improvement -- Get better as you go forward

    A five-question multiple-choice quiz to test your understanding of the content presented by expert Richard Mackey in this lesson of SearchSecurity.com's Compliance School.

  • February 19, 2007 19 Feb'07

    What is presence?

    Presence technology makes it possible to locate and identify a computing device wherever it might be, as soon as the user connects to the network.

  • February 19, 2007 19 Feb'07

    What is unified communications?

    Defining unified communications.

  • February 19, 2007 19 Feb'07

    What is communication-enabled-business processes (CEBP)?

    Defining communication-enabled business processes.

  • February 18, 2007 18 Feb'07

    CDP platform purchase considerations

    Busy IT organizations are employing continuous data protection (CDP) technologies to guard data on the fly, essentially eliminating the backup window and allowing granular file and system restoration -- sometimes down to the individual disk write ...

  • February 15, 2007 15 Feb'07

    News Wrap 2.0

    We've just discovered a great new application for technology that can save you an incredible amount of time, money and heartache.

  • February 14, 2007 14 Feb'07

    VoIP complexities stall implementation for SMBs

    VoIP sales in the SMB market are predicted to lead revenue in the next several years, but most SMBs are confused by the number of different solutions.

  • February 14, 2007 14 Feb'07

    New attack technique threatens broadband users

    Millions of broadband users across the globe are threatened by a new attack technique called drive-by pharming

  • February 14, 2007 14 Feb'07

    Cancer clinic juggles two-tiered storage environments

    Karmanos Cancer Institute is using two separate tiered storage systems from EMC and Sun, and says it has yet to find a single storage vendor that can meet all its requirements.

  • February 14, 2007 14 Feb'07

    Cisco VoIP managment guide: Required management tasks

    Comprehensive VoIP management includes the basic network management tasks, but also includes monitoring services such as dial tone delivery, call success rates, telephony delays and impairments, as well as call quality. VoIP telephony management is ...

  • February 13, 2007 13 Feb'07

    Fortune 500 firm takes a crack at data classification

    A life sciences company undertakes a data classification project with Abrevity and discovers the job is never done.

  • February 12, 2007 12 Feb'07

    Mobile carriers admit to malware attacks

    Eighty-three percent of mobile operators surveyed by McAfee Inc. say they've suffered malware infections, but two competing security vendors say the overall threat is still small.

  • February 12, 2007 12 Feb'07

    Microsoft fixes zero-day flaws in Word, Office

    Twelve security updates from Microsoft fix a range of problems, including a flaw in the Malware Protection Engine and previously-exploited zero-days glitches in Word and Office.

  • February 12, 2007 12 Feb'07

    Siemens' acquisition of UGS 'will benefit users'

  • February 12, 2007 12 Feb'07

    Skype makes more enterprise inroads

    Skype has teamed with FaceTime Communications to give companies more control over Skype use within the enterprise.

  • February 11, 2007 11 Feb'07

    VoIP helps ensure disaster recovery

    VoIP bolsters your disaster recovery plans and should be at the core of any well-planned disaster recovery strategy.

  • February 11, 2007 11 Feb'07

    Solaris 10 has zero-day Telnet flaw

    Attackers could exploit a zero-day flaw in Solaris 10's Telnet daemon to bypass authentication and gain unauthorized system access, security experts warn.

  • February 11, 2007 11 Feb'07

    Cybersecurity czar signals government cooperation at RSA Conference

    Cybersecurity chief, Greg Garcia told RSA Conference attendees that government, enterprises and academia need to work together to fight growing Internet threats.