News

News Archive

  • August 30, 2006 30 Aug'06

    Malware database access sparks debate

    Should an emerging database of more than 300,000 malware samples remain a walled community for trusted users, or is open access the best way to fight off digital desperados?

  • August 29, 2006 29 Aug'06

    AT&T breach affects 19,000 customers

    Online outlaws hacked into an AT&T computer system and stole credit card data on thousands of customers. AT&T has offered to pay for credit monitoring services for those affected.

  • August 29, 2006 29 Aug'06

    An era ends as Tandberg buys Exabyte

    The once-dominant player in the tape market has ended a long downward spiral by selling off its assets. At least customers can now count on continued support, analysts say.

  • August 28, 2006 28 Aug'06

    Microsoft probes alleged Internet Explorer flaw

    A research group claims attackers could launch malicious code using a flaw in the way Internet Explorer instantiates certain COM objects' ActiveX controls.

  • August 28, 2006 28 Aug'06

    Virtualisation eases patch management pain

    IT managers are learning that using desktop virtualisation software to patch their enterprise desktops has the potential to save time, money and energy.

  • August 28, 2006 28 Aug'06

    Riverbed update offers users more bandwidth, better reporting

    Riverbed announced a package of hardware and software updates, which some customers say they've been waiting for.

  • August 28, 2006 28 Aug'06

    ProCurve rolls out three new switch series

    ProCurve Networking by HP has added three new series of switches to its lineup.

  • August 27, 2006 27 Aug'06

    Third-party patching: Prudent or perilous?

    Security patches issued by third parties have become more prevalent in recent months, and while some security pros endorse them, others say they're more trouble than they're worth.

  • August 27, 2006 27 Aug'06

    3PAR adds midrange array for secondary sites

    3PAR has introduced a smaller version of its InServ Storage Server, which it describes as a product-line extension into its existing customer base.

  • August 27, 2006 27 Aug'06

    Duplex mismatch

    This article helps networking engineers understand the issues behind duplex mismatch, one of the most troublesome problems in today's Ethernet networks. Learn why duplex mismatch occurs and how you can prevent it with autonegotiation and hard coding.

  • August 24, 2006 24 Aug'06

    Are tape backups a thing of the past when it comes to disaster recovery?

    I guess we have to look at disaster recovery, when it comes to tapes, in order of priorities. So, if we're talking about your most critical applications nowadays -- your most critical data -- tape backup is actually losing favor to disk backup or ...

  • August 24, 2006 24 Aug'06

    Should I back up the operating system files?

    We hear a lot about single-instance storage; single-instance backup. When you start backing up operating system files, you will have the same .DLL, for example, on each of your Windows servers -- you may have 100 servers. I would say, if you have a ...

  • August 24, 2006 24 Aug'06

    How do I establish recovery priority for my applications?

    If it's at the IT level, it comes from a data perspective. When you start moving up a little bit into the business side, people start looking at the applications because they don't really know where the data is. If we talk today about virtualization...

  • August 24, 2006 24 Aug'06

    Security Blog Log: Opinions abound on IBM/ISS deal

    Bloggers ponder what IBM's acquisition of ISS says about the industry as a whole. Is the end in sight for independent security vendors?

  • August 24, 2006 24 Aug'06

    How do I identify what data to replicate and what data to simply backup?

    It goes back again to the value of the data to your organization -- or the impact of losing access to this data. Typically, from a business continuity perspective, the best way to establish this is through what we call a "business impact analysis," ...

  • August 24, 2006 24 Aug'06

    What is the difference between RPO and RTO (from a backup perspective)?

    The recovery point objective (RPO) and the recovery time objective (RTO) are two very specific parameters that are closely associated with recovery. The RTO is how long you can basically go without a specific application. This is often associated ...

  • August 24, 2006 24 Aug'06

    What is the most important aspect of data protection when it comes to DR?

    You could answer that with one word really, and I would have to say "testing." Just "testing." Whatever you do when you're protecting data, whether it's a backup, whether it's replication, whatever it is, make sure that you test what you put in ...

  • August 24, 2006 24 Aug'06

    Weekly compilation of storage news

    Symantec peddles enterprise vault toolT and the new features developed because of a recent update to the US Federal Rules of Civil Procedure.

  • August 24, 2006 24 Aug'06

    Aren't backups and archives essentially the same thing?

    The answer to that can be a "yes" and "no." If we look at a very high level, a copy of data is a copy of data, and that's where a lot of people confuse both as being somewhat the same -- one copy is just kept longer. When we start digging into what ...

  • August 24, 2006 24 Aug'06

    What do tiered storage and ILM have to do with disaster recovery?

    That idea ties back into the topics of data growth, data control, data management and recoverability. Once you start categorizing your data based on criticality and recovery priority, it gives you an indication of your data segments. We have our ...

  • August 24, 2006 24 Aug'06

    How far apart should my production and alternate recovery sites be?

    As a good consultant, I would have to use the typical answer; it depends. We have a few things to consider here. First, what kind of disaster are you trying to protect yourself (or your organization) from? Second, what is your geography like?

  • August 24, 2006 24 Aug'06

    Cisco patches flaws in multiple products

    Attackers could corrupt files, cause a denial of service and bypass security restrictions via flaws in several of Cisco's firewall and VPN products.

  • August 23, 2006 23 Aug'06

    Remote access, WAN optimization, and network analysis news

    Briefs: Remote access from Positive Networks helps with disaster recovery plans; Ipanema Technologies provides WAN optimization; Lancope rolls out network behavior analysis and response system tools.

  • August 22, 2006 22 Aug'06

    Column: VoIP applications fuel the next wave of VoIP innovation

    The first phase of VoIP is nearing the end and corporations will soon find a variety of third-party desktop applications that run on VoIP. Has VoIP improved the day-to-day for end users?

  • August 21, 2006 21 Aug'06

    Briefs: VoiceCon in the news

    This week at VoiceCon we saw everything from managed VoIP services to IP phones made to make mobile workers right at home, wherever they are.

  • August 21, 2006 21 Aug'06

    IBM spruces up storage line

    IBM floated a raft of announcements across its storage line, but analysts say they are still waiting for the updates stuck in the research phase.

  • August 21, 2006 21 Aug'06

    Update: Microsoft fixes faulty Internet Explorer patch

    Update: Microsoft has fixed a faulty browser fix that enabled an exploitable condition. Souces say a compatibility problem with Systems Management Server delayed the fix.

  • August 20, 2006 20 Aug'06

    AOL data spill leads to dismissals, resignation

    AOL has fired two employees and its CTO has left the company after search data from 658,000 customers was accidentally exposed earlier this month.

  • August 20, 2006 20 Aug'06

    Twin Trojans use PowerPoint to spread

    Researchers aren't yet sure if troublesome new Trojan horse programs are exploiting a new PowerPoint flaw or the vulnerabilities Microsoft patched Aug. 8.

  • August 20, 2006 20 Aug'06

    Preparing for 'little disasters' often neglected

    Tom Dugan, CTO of Recovery Networks, says it's common for users to prepare to lose an entire building -- but aren't ready for small-scale losses – like losing a server.

  • August 17, 2006 17 Aug'06

    Apple fixes Xsan security flaw

    Attackers could exploit a security flaw in Apple's Xsan file system to launch malicious code and crash vulnerable machines, but a fix is available.

  • August 16, 2006 16 Aug'06

    Cisco struggles with SIP firewall flaw

    Cisco admits it can't reproduce a SIP security flaw in its PIX firewall that was first identified by a researcher at Black Hat.

  • August 16, 2006 16 Aug'06

    Briefs: VoIP in the news

    Asterisk maker Digium gets major funding; Quintum's VoIP switch offers backup option for branch office; The Cisco Store makes the case for unified communications.

  • August 16, 2006 16 Aug'06

    Wireless security push fueled by paranoia

    Wireless security became a necessity for Intermagnetics, but when the company used its access points to monitor the spectrum, performance suffered.

  • August 15, 2006 15 Aug'06

    Cisco says it can't reproduce PIX flaw

    Ever since a researcher at Black Hat outlined a flaw in the PIX firewall, Cisco has been trying to reproduce the security hole. So far, the company has been unsuccessful.

  • August 15, 2006 15 Aug'06

    Cisco boosts VoIP certification

    The upgraded CCNP midlevel Cisco certification now incorporates VoIP, security and wireless to boost converged network skills among enterprise professionals.