News

News Archive

  • October 30, 2006 30 Oct'06

    Messaging Security School

    SearchSecurity.com's Messaging Security School has brought together some of the most knowledgeable experts in the messaging security field to offer you personal instruction on how to secure the information handled by your organization's knowledge ...

  • October 30, 2006 30 Oct'06

    Instant messaging attacks rise in October

    In October alone, security firm Akonix Systems tracked 88 attacks that used instant messaging programs to spread. Attackers are also exploiting P2P programs.

  • October 30, 2006 30 Oct'06

    Countermeasures for malicious email code

    Today's malware continues to raise the security stakes. Enterprises are now facing numerous evolving threats like targeted and blended attacks, zero-day exploits, botnets and phishing schemes. The attacks aren't the only things evolving; so are ...

  • October 30, 2006 30 Oct'06

    Wireless network security testing

    The abundance of wireless devices is making wireless networks -- both authorised and unauthorised -- more common. Attack your own wireless networks to find vulnerabilities before malicious hackers do. Security testing expert Kevin Beaver covers the ...

  • October 30, 2006 30 Oct'06

    Storage vendors polish their wares at SNW

    EMC upgrades recovery management software, HP unveils a storage blade and VTL gateway for the EVA; IBM sweetens warranty for DS8000; Symantec updates Backup Exec and Ghost.

  • October 30, 2006 30 Oct'06

    Storage vendors polish their wares at SNW, page 2

    EMC upgrades recovery management software, HP unveils a storage blade and VTL gateway for the EVA; IBM sweetens warranty for DS8000; Symantec updates Backup Exec and Ghost.

  • October 30, 2006 30 Oct'06

    Survey: Data breach costs surge

    A new study by the Ponemon Institute finds a 31% increase in the costs associated with a data breach.

  • October 30, 2006 30 Oct'06

    Firefox fans unfazed by IE 7

    IT administrators like the security improvements in IE 7. But for those who use Firefox, Microsoft's browser upgrade isn't enough to make them switch.

  • October 26, 2006 26 Oct'06

    Achieving compliance: a real-world roadmap

    A security manager's responsibilities extend beyond the technical aspects of the job. These days, effective governance and compliance are just as essential.

  • October 26, 2006 26 Oct'06

    Security Blog Log: The never-ending PatchGuard debate

    This week, security vendor fright over the Windows Vista PatchGuard feature permeates the blogosphere. Is Microsoft the boogeyman, or just misunderstood?

  • October 26, 2006 26 Oct'06

    What storage managers are buying and why

    The second installment of the 2006 edition of Storage magazine's exclusive Purchasing Intentions Survey reveals key storage technology purchasing decisions by storage managers across all industries.

  • October 26, 2006 26 Oct'06

    IT greats: Top 10 greatest IT people

    For every world-famous name with a world famous fortune – think Bill Gates, Steve Jobs and Michael Dell – there are hundreds of other individuals who have moved the IT industry and its technology inexorably forward

  • October 25, 2006 25 Oct'06

    Cisco launches mega videoconferencing system

    Cisco Systems Inc. has talked about TelePresence and demonstrated it, and now it's finally something enterprises can buy, but at six figures it's a high price to pay.

  • October 25, 2006 25 Oct'06

    Video, audio are network drains

    Network misuse is rampant, according to a recent survey. Employees using the corporate network for recreation or high-bandwidth business can put a strain on network resources, but network engineers can combat that with filtering and monitoring.

  • October 25, 2006 25 Oct'06

    Sourcefire looking to go public

    The company behind the popular Snort open source IDS tool is making a bid to go public, months after its deal to be acquired by Check Point collapsed.

  • October 25, 2006 25 Oct'06

    EMC shuffles channel deck

    EMC announced on its earnings call earlier this month that it would be cutting management jobs as part of a round of 1,250 layoffs, and it looks like at least a couple of those positions have already gone from the channel group.

  • October 25, 2006 25 Oct'06

    Research shows massive botnet growth

    Reports from McAfee and Microsoft show bot herders are gaining ground and threatening national infrastructure. Some suppliers hope to strike back by sharing resources.

  • October 24, 2006 24 Oct'06

    How does the service provider differentiate between data and VoIP as data?

    For our mobile devices in trucks, we use GSM/GPRS communication. Our customers are paying for a certain data amount -- depending on the service package to which they subscribe. We use a modem in our device, which can do both data and voice. But as I...

  • October 23, 2006 23 Oct'06

    What storage managers are buying and why, page 3

    What storage managers are buying and why

  • October 23, 2006 23 Oct'06

    What storage managers are buying and why, page 7

    What storage managers are buying and why

  • October 23, 2006 23 Oct'06

    Symantec patches AntiVirus Corporate Edition flaw

    Attackers could exploit a flaw in Symantec AntiVirus Corporate Edition and Client Security to overwrite kernel addresses, crash machines and run malicious code.

  • October 23, 2006 23 Oct'06

    What storage managers are buying and why, page 2

  • October 23, 2006 23 Oct'06

    Comparing VoIP vendors

    For many companies, the tough decision isn't whether to use IP telephony or not -- it's which vendor to choose. We've collected some of Carrie Higbie's tips and tricks for vendor selection, garnered from her "Ask-the-Expert" section. Carrie ...

  • October 23, 2006 23 Oct'06

    What storage managers are buying and why, page 6

    What storage managers are buying and why

  • October 23, 2006 23 Oct'06

    Comparing VoIP vendors

    For many companies, the tough decision isn't whether to use IP telephony or not -- it's which vendor to choose. We've collected some of Carrie Higbie's tips and tricks for vendor selection, garnered from her 'Ask-the-Expert' section. Carrie ...

  • October 23, 2006 23 Oct'06

    SATA boosts RAID 6 use

    High-capacity SATA disks are driving up the use of RAID 6, which has prompted vendors to create new ways of overcoming the performance hit incurred with dual-parity protection.

  • October 23, 2006 23 Oct'06

    Security researcher, professor influences students for life

    Dorothy Denning, a professor of defense analysis at the Naval Postgraduate School, has contributed to the field of data security. Her work earned her a Security 7 award.

  • October 23, 2006 23 Oct'06

    SDL expected to help fulfil Vista security promises

    Windows Vista is expected to be the most secure Microsoft product released thanks to the company's implementation of the Security Development Lifecycle (SDL).

  • October 23, 2006 23 Oct'06

    QLogic dives into directors

    QLogic will announce its new SanBox 9000 director this week, but it's missing true director-class features and is encroaching on a market already dominated by Brocade and Cisco.

  • October 23, 2006 23 Oct'06

    IT executives eager to exploit Web 2.0 wave

    What good is a blog if no one reads it? IT managers find out and begin to make blogging and other Web 2.0 tools a more strategic part of their business.

  • October 23, 2006 23 Oct'06

    Boston Celtics face off against spyware

    One of the Boston Celtics' toughest opponents was spyware until the IT shop fought back. The team's IT chief explains how he gained the upper hand.

  • October 22, 2006 22 Oct'06

    Information Security Decisions Session Downloads

    Session Downloads from Information Security Decisions 2006 Conference.

  • October 22, 2006 22 Oct'06

    Enhanced Identity and Access Management

    From consolidating directories to automating provisioning and rolling out single sign-on, these sessions identify how leading organizations are strengthening authorization and enforcing access controls.

  • October 22, 2006 22 Oct'06

    Snyder On Security: An insider's guide to the essentials

    Joel Snyder, senior partner with consultancy Opus One, provides an in-depth look at information security trends and technologies.

  • October 22, 2006 22 Oct'06

    EMC plays catch-up with Clariion

    Clariion arrays now have support for both Fibre Channel and iSCSI in one box, as well as other features that competitors have been using against EMC for some time.

  • October 19, 2006 19 Oct'06

    Xiotech, Pillar scale down, support iSCSI

    Xiotech, Pillar introduce entry-level iSCSI arrays; Overland loses Dell deal; EMC and IBM report earnings.

  • October 18, 2006 18 Oct'06

    Rural Payments Agency project failed after IT system costs spiralled

    Delays in implementing a bespoke IT system led to the Rural Payments Agency (RPA) failing to pay subsidies to farmers on time, according to a National Audit Office report.

  • October 17, 2006 17 Oct'06

    Am I out of luck if I have a "mixed" email system (e.g., Exchange and Notes)?

    That's a "real-life" situation that we run into many times when we've gone out and worked with companies. We might be called in by a company that has both a Microsoft Exchange and a Notes/Domino email system and they want to tie an archive together,...

  • October 16, 2006 16 Oct'06

    Ray Noorda, the pioneer behind rise of Novell, dies

    Network computing pioneer and former Novell chief executive Ray Noorda has died aged 82.

  • October 16, 2006 16 Oct'06

    Oracle fixes 101 flaws

    Attackers could exploit 45 of the 101 flaws remotely without a username or password. Meanwhile, the new CPU offers more detail on the number of flaws patched and their severity.

  • October 16, 2006 16 Oct'06

    Security Bytes: Flaws fixed in Bugzilla

    Meanwhile, security holes are also plugged in Cisco's Wireless Location Appliance software and Clam AntiVirus.

  • October 16, 2006 16 Oct'06

    Cisco ramps up unified communications tools

    Cisco last week released a host of new products to enhance its suite of unified communications tools, including an IP phone that's easier for end users to accept.

  • October 15, 2006 15 Oct'06

    Microsoft caves to pressure over Vista security

    To accommodate third-party security vendors and appease antitrust regulators in Europe, Microsoft will make some final tweaks to Windows Vista.

  • October 15, 2006 15 Oct'06

    Flaw found in Toshiba wireless device driver

    Attackers could exploit a flaw in the Toshiba Bluetooth wireless device driver to cause a denial of service or launch malicious code on victims' machines.

  • October 15, 2006 15 Oct'06

    Sun goes back to its roots with Honeycomb user

    Stanford University is the first official Honeycomb customer; it will be using the programmable storage archive for its massive Google library project.

  • October 12, 2006 12 Oct'06

    Microsoft to fold security into Windows division

    The software giant said the move would make future Windows development efforts more efficient. The changes take effect after Microsoft releases Vista.

  • October 12, 2006 12 Oct'06

    What to do when your server goes down

    When a server goes down at a particular time every night without the prompt of a virus, our expert, Puneet Mehta, can tell you what the problem is and what you can do to avoid it.

  • October 12, 2006 12 Oct'06

    Sprint spin-off struggles with mainframe tape migration

    Telecom firm Embarq touched a nerve with mainframe users at StorageTek Forum -- huge tape migrations are forcing them to reconsider their historic loyalty to tape.

  • October 11, 2006 11 Oct'06

    Brief: Malicious Web site poses as Google

    A malicious Web site poses as Google's Italian site, but attempts to install malicious ActiveX controls on victim's machines and ultimately redirect them to adult content.

  • October 11, 2006 11 Oct'06

    Does Spanning Tree Protocol have an adverse effect on VoIP?

    Do you know if Spanning Tree has an adverse effect upon VoIP? If so, what is the best way to provide LAN-based switch redundancy to VoIP gateways?