News

News Archive

  • November 07, 2006 07 Nov'06

    Mozilla fixes Firefox flaws

    Attackers could exploit multiple flaws in Firefox, SeaMonkey and Thunderbird to crash machines, bypass security restrictions and launch malicious code.

  • November 07, 2006 07 Nov'06

    Big pay for storage jobs, page 2

    Find out what other storage professionals are being paid in this year's salary survey.

  • November 07, 2006 07 Nov'06

    NetApp to acquire Topio

    Six months after EMC acquired heterogeneous replication provider Kashya, NetApp jumps on the bandwagon by announcing plans to acquire Topio for $160M.

  • November 07, 2006 07 Nov'06

    VMware backup still tough

    VMware backup using Consolidated Backup is easier said than done, according to users at this week's VMworld show in Los Angeles.

  • November 06, 2006 06 Nov'06

    How to manage encryption keys

    Encryption is an effective way to secure data, but the encryption keys used must be carefully managed to ensure data remains protected and accessible when needed.

  • November 06, 2006 06 Nov'06

    Agency improves security grades under CISO's watch

    CISO Philip Heneghan has made security a way of life for the U.S. Agency for International Development (USAID). His work earned him a Security 7 award.

  • November 06, 2006 06 Nov'06

    Softek rides IBM mainframe wave, plans acquisition

    Data migration software provider Softek is planning to acquire Enigma to boost its mainframe storage software business.

  • November 06, 2006 06 Nov'06

    Sourcefire IPO could fuel Snort, users say

    Snort users frowned when Check Point tried to acquire Sourcefire last year. But they are more optimistic about Sourcefire's plans to go public.

  • November 06, 2006 06 Nov'06

    The big security/storage crossover: Is your job safe? [Part One: The recruiter]

    Since EMC acquired RSA and Symantec enveloped Veritas, both have started discussing 'protection' of data as the sensible sequel to both storage and security. In the first of a four part series series, TechTarget ANZ asks several industry experts ...

  • November 05, 2006 05 Nov'06

    Microsoft eyes second zero-day threat in a week

    This time, attackers are going after a zero-day flaw in Windows, and Microsoft has released some workarounds until a patch is available.

  • November 05, 2006 05 Nov'06

    NetApp adds a midrange box, tunes up software

    NetApp adds the FAS3070 to its midrange lineup to compete with EMC's CX3-80 and updates a number of its software products.

  • November 05, 2006 05 Nov'06

    Mobile device encryption - a practice not often applied

    Encryption is the best way to protect data on mobile devices -- but too few companies are actually deploying this critical technology.

  • November 02, 2006 02 Nov'06

    Review: SPI Dynamics' WebInspect 6.1

    SPI Dynamics has created a powerful tool for novices as well as advanced users who will appreciate the time and effort it saves.

  • November 02, 2006 02 Nov'06

    Reporter's Notebook: Whispers and rumbles from SNW

    Floridians talked DR, big guys quibbled over deduplication, and rumors of acquisitions and new products to come flew at SNW Orlando this year.

  • November 01, 2006 01 Nov'06

    Tor network privacy could be cracked

    The Tor network is used by those who want to keep their IP addresses private. But new research shows that it's possible to compromise the system and unmask the user.

  • November 01, 2006 01 Nov'06

    Juniper Networks' enterprise router takes aim at Cisco branches

    Juniper's new branch office J-Series routers provide all-in-one security, VoIP, WAN acceleration box to rival Cisco's ISR router.

  • November 01, 2006 01 Nov'06

    VoIP convergence: Managing staffing issues

    Companies making the transition to IP telephony must find a way to converge their voice and data networks -- and the employees who work on them.

  • November 01, 2006 01 Nov'06

    What is a seamless router?

    In this expert response, Sudhanshu Gupta gives us a quick history lesson in routing when he answers the question "what is meant by the term 'seamless router'?"

  • November 01, 2006 01 Nov'06

    Exploit code released for Apple Wi-Fi flaw

    Details on how to attack a flaw in Apple's wireless software were released as part of a new project called the "Month of Kernel Bugs."

  • October 31, 2006 31 Oct'06

    Flaw found in Firefox 2.0

    Attackers could exploit the security flaw to crash versions 1.5.0.7 and 2.0 of the browser, according to various security advisories.

  • October 31, 2006 31 Oct'06

    E-vaulting's many faces can confuse IT efforts

    E-vaulting is the process that describes how enterprise IT departments ship backup tapes and replicate data to remote disk arrays and VTLs. E-vaulting is not a new concept, but more recently it has grown to mean remote backups and replication for ...

  • October 31, 2006 31 Oct'06

    Five years until FAN's a hit: Brocade Australia

    File Area Networks (FANs) will take around five years to become a ubiquitous piece of enterprise storage infrastructure, according to Graham Schultz, Brocade's Country Manager for Australia.

  • October 31, 2006 31 Oct'06

    Internode covers Coorong with solar-powered broadband

    Internode has blended super-fast ADSL2+ broadband with solar-powered microwave towers to deliver virtually total broadband coverage across South Australia's largest local government region.

  • October 31, 2006 31 Oct'06

    Zero-day attacks target Microsoft Visual Studio

    Microsoft has outlined a series of steps users should take to protect their machines from attacks that exploit a new zero-day flaw in Visual Studio 2005.

  • October 31, 2006 31 Oct'06

    In IT security, vendor size does not compute

    With consolidation gripping the security industry, companies are seeking out the most stable security vendors, but analysts and experts say the biggest firms aren't necessarily the most prudent investment.

  • October 31, 2006 31 Oct'06

    Net neutrality: All or nothing, or somewhere in between?

    The notion of net neutrality can hinder VoIP QoS guarantees and thus has incited a contentious debate.

  • October 30, 2006 30 Oct'06

    Messaging Security School

    SearchSecurity.com's Messaging Security School has brought together some of the most knowledgeable experts in the messaging security field to offer you personal instruction on how to secure the information handled by your organization's knowledge ...

  • October 30, 2006 30 Oct'06

    Instant messaging attacks rise in October

    In October alone, security firm Akonix Systems tracked 88 attacks that used instant messaging programs to spread. Attackers are also exploiting P2P programs.

  • October 30, 2006 30 Oct'06

    Countermeasures for malicious email code

    Today's malware continues to raise the security stakes. Enterprises are now facing numerous evolving threats like targeted and blended attacks, zero-day exploits, botnets and phishing schemes. The attacks aren't the only things evolving; so are ...

  • October 30, 2006 30 Oct'06

    Wireless network security testing

    The abundance of wireless devices is making wireless networks -- both authorised and unauthorised -- more common. Attack your own wireless networks to find vulnerabilities before malicious hackers do. Security testing expert Kevin Beaver covers the ...

  • October 30, 2006 30 Oct'06

    Storage vendors polish their wares at SNW

    EMC upgrades recovery management software, HP unveils a storage blade and VTL gateway for the EVA; IBM sweetens warranty for DS8000; Symantec updates Backup Exec and Ghost.

  • October 30, 2006 30 Oct'06

    Storage vendors polish their wares at SNW, page 2

    EMC upgrades recovery management software, HP unveils a storage blade and VTL gateway for the EVA; IBM sweetens warranty for DS8000; Symantec updates Backup Exec and Ghost.

  • October 30, 2006 30 Oct'06

    Survey: Data breach costs surge

    A new study by the Ponemon Institute finds a 31% increase in the costs associated with a data breach.

  • October 30, 2006 30 Oct'06

    Firefox fans unfazed by IE 7

    IT administrators like the security improvements in IE 7. But for those who use Firefox, Microsoft's browser upgrade isn't enough to make them switch.

  • October 26, 2006 26 Oct'06

    Achieving compliance: a real-world roadmap

    A security manager's responsibilities extend beyond the technical aspects of the job. These days, effective governance and compliance are just as essential.

  • October 26, 2006 26 Oct'06

    Security Blog Log: The never-ending PatchGuard debate

    This week, security vendor fright over the Windows Vista PatchGuard feature permeates the blogosphere. Is Microsoft the boogeyman, or just misunderstood?