IT management
-
News
24 Dec 2024
Top 10 police technology stories of 2024
Here are Computer Weekly’s top 10 police technology stories of 2024 Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
24 Dec 2024
Top 10 EMEA stories of 2024
Here are Computer Weekly’s top 10 Europe, Middle East and Africa stories of 2024 Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
03 Aug 2006
Vendors reject preferential knowledge sharing
While Cisco continues to investigate a potential PIX firewall flaw, it and other vendors say sharing security information quickly and indiscriminately is always the best policy. Continue Reading
By- Michael Mimoso, TechTarget
-
News
03 Aug 2006
Ajax threats worry researchers
Black Hat: While it makes smooth Web applications like Google Maps possible, the rush to adopt Ajax may fuel haphazard development and a feeding frenzy among hackers. Continue Reading
By -
Feature
03 Aug 2006
Thwarting IM management challenges
Product review: Information Security magazine's Sandra Kay Miller says Symantec's IM Manager 8.0 has limited public network features, but offers excellent reporting Continue Reading
By- Sandra Kay Miller
-
Feature
03 Aug 2006
Akonix A-Series offers complex, best-of-breed IM security
Product review: Information Security magazine's Sandra Kay Miller says The Akonix A-Series instant messaging security appliances works well but needs better documentation. Continue Reading
By- Sandra Kay Miller
-
Feature
03 Aug 2006
Countering attackers with NAC, IPS
Product review: Information Security magazine's Wayne Rash says ForeScout Technologies' flexible CounterACT appliance combines NAC with IPS and is worth the investment. Continue Reading
By- Wayne Rash
-
Feature
03 Aug 2006
Security event management, no strings attached
Product review: Information Security magazine's Joel Snyder says Check Point's vendor-agnostic Eventia Analyzer 2.0/Eventia Reporter is worth consideration despite limited BI options. Continue Reading
By- Joel Snyder, Opus One
-
News
02 Aug 2006
Mobile security begins with policy
Mobile security can no longer be an afterthought. Mobile experts say security starts, but doesn't end, with policy. Continue Reading
By- Andrew R. Hickey, News Writer
-
News
02 Aug 2006
Twelve Microsoft fixes coming on Patch Tuesday
Microsoft Tuesday will release a dozen new security bulletins for its Windows and Office products, likely including fixes for several outstanding PowerPoint flaws. Continue Reading
By- Eileen Kennedy, News Writer
-
News
02 Aug 2006
Possible Cisco zero-day exploit revealed at Black Hat
Details of an alleged flaw related to SIP and PIX appliances, briefly mentioned in a Wednesday Black Hat presentation, are being kept under wraps as Cisco and US-CERT investigate. Continue Reading
By- Michael Mimoso, TechTarget
-
News
01 Aug 2006
Litchfield: Database security is 'IT's biggest problem'
At Black Hat USA 2006, database security guru David Litchfield unveils 20-plus IBM Informix flaws that attackers could exploit to create malicious files, gain DBA-level privileges and access sensitive data. Continue Reading
By -
News
01 Aug 2006
Security Bytes: Exploits targeting freshly patched Apple flaw
Apple patches nearly two dozen holes in OS X, but not before exploits are unleashed. Plus McAfee fixes a critical flaw and EMC gets the OK to buy RSA. Continue Reading
By- SearchSecurity.com Staff
-
Feature
01 Aug 2006
PING with Heidi Kujawa
Heidi Kujawa, director of enterprise architecture services for Sony Pictures Entertainment, explains how combatting piracy takes more than just keeping bootleggers out of the theatres Continue Reading
-
News
31 Jul 2006
Security Bytes: ISS warns of new Microsoft Windows flaw
Attackers could exploit the latest Microsoft Windows flaw to crash vulnerable machines and Symantec fixes a Brightmail AntiSpam flaw. Continue Reading
By- SearchSecurity.com Staff
-
Feature
31 Jul 2006
Beyond HIPAA and GLBA
Most firms are familiar with HIPAA, Gramm-Leach-Bliley and Sarbanes-Oxley, but newer regulations are pushing certain industry sectors to adopt strong authentication Continue Reading
-
News
30 Jul 2006
EqualLogic updates storage provisioning software
Users have more options when it comes to pooling storage with version 3.0 of EqualLogic's array software, but some are wondering whatever happened to the SAS disks. Continue Reading
By- Beth Pariseau, Senior News Writer
-
News
26 Jul 2006
DHS puts Zitz in charge of cybersecurity division
American career intelligence officer Robert S. Zitz has taken over day-to-day operations of the US National Cyber Security Division, but his department still has numerous digital defence problems to remedy. Continue Reading
-
News
26 Jul 2006
Mozilla issues critical security updates
New patches to fix 13 software security flaws, eight of which have been deemed critical. Continue Reading
By- Eric Parizo, Senior Analyst
-
News
26 Jul 2006
Blue Cross bears burden of 'no wireless' policy
Blue Cross of Idaho had a "no wireless" policy on paper but never really enforced it. That is, until a team of auditors said the company had better do something. Continue Reading
By- Andrew R. Hickey, News Writer
-
News
25 Jul 2006
Employee monitoring should be done with care
Employee monitoring is on the rise as firms try to safeguard their sensitive information and increase productivity. Continue Reading
By- Gary S. Miliefsky
-
News
24 Jul 2006
Security Bytes: New Microsoft exploits in the wild
The exploits target issues Microsoft patched earlier this month. Meanwhile, flaws are reported in Oracle for OpenView and a Mozilla Firefox keystroke logger is on the loose. Continue Reading
By- SearchSecurity.com Staff
-
News
18 Jul 2006
Midsized firms reach out to backup service providers
Data growth and ever-tightening compliance rules are among the factors driving some organizations to turn to service providers for help with backups. Continue Reading
By- Beth Pariseau, Senior News Writer
-
News
14 Jul 2006
CSI survey: Data breaches still being swept under the rug
The annual CSI/FBI Computer Crime and Security Survey shows companies are reporting fewer financial losses from data breaches. That doesn't mean the good guys are winning. Continue Reading
By - News 14 Jul 2006
-
News
13 Jul 2006
Security Bytes: Investigators slam VA over data breach
Meanwhile: Cisco patches a router application flaw, a Washington law firm sues IBM over a server attack; and spammers sucker Web surfers with fake Vladimir Putin death reports. Continue Reading
By- SearchSecurity.com Staff
-
News
13 Jul 2006
Trojan targets Microsoft PowerPoint flaw
Update: The exploit might be tied to an older flaw in Excel. Attackers who exploit the serious flaw could launch arbitrary code. Microsoft says it is investigating. Continue Reading
By -
News
11 Jul 2006
Critical flaws found in Excel, Flash Player
FrSIRT says holes in Microsoft's spreadsheet program and Adobe's media player could allow attackers to take control of affected machines and initiate malicious commands. Continue Reading
By -
News
11 Jul 2006
Looking ahead to life without passwords
Security pros know that passwords are nothing but trouble. For them, single-sign on, two-factor authentication and federated ID represent the path to stronger authentication. Continue Reading
By - News 10 Jul 2006
- News 10 Jul 2006
-
News
10 Jul 2006
Security Bytes: Data breach affects 100,000 military personnel
Meanwhile: Phishers use a phone trick to dupe PayPal users; the PCI security standard will get more teeth and a survey illustrates an increase in security breaches Continue Reading
By- SearchSecurity.com Staff
- News 10 Jul 2006
-
News
06 Jul 2006
Strong authentication for businesses large and small
Product review: Customer service could return calls more quickly when there's a problem. But overall, RSA SecurID Appliance 2.0 delivers robust, scalable protection. Continue Reading
By- Phoram Mehta, Contributing Writer
-
News
27 Jun 2006
Cost of Libra magistrates system trebles
The Department of Constitutional Affairs has admitted that the cost of the Libra case management system for magistrates courts will rise to £487m – more than three times the £146m original cost set in 1998. Continue Reading
-
News
26 Jun 2006
Dundee to teach ethical hacking BSc
A degree in ethical hacking will be on offer at a Scottish university from the new academic year. Continue Reading
By -
News
15 Jun 2006
Microsoft offers SMBs all-in-one security and protection
Small- to medium-sized businesses (SMBs) are among the key targets of Microsoft's latest solution, Windows Live OneCare. Continue Reading
- News 13 Jun 2006
-
News
01 Jun 2006
FullArmor lives up to its name
PolicyPortal provides an Internet interface to easily configure, monitor and enforce near real-time Active Directory-based policy compliance through client agents. Continue Reading
By- James Foster, CSC
-
News
01 Jun 2006
BlueCat appliance offers rock-solid security
Hot Pick: The Adonis 1000 appliance bundles DNS and DHCP into an enterprise-class appliance for the centralized secure operation of network addressing. Continue Reading
By- Sandra Kay Miller, Contributing Writer
-
News
03 May 2006
Shifting services back indoors
Almost a quarter of blue chip firms in the UK are so disillusioned with outsourcing they are hauling their services back in-house. Continue Reading
-
Feature
21 Apr 2006
SMB finds the perfect host
When All3Media, a medium-sized TV programming producer, inherited an inflexible communications system, it turned to a more appealing, hosted alternative. Continue Reading
By- Kate Large
-
Feature
11 Apr 2006
Questions that need to be answered on NHS IT plan
Four years ago the government announced to a grateful NHS a national IT programme that would become the world's largest civil computer scheme. Continue Reading
By -
News
28 Mar 2006
Outsourced way to hire contract staff
IT services company FDM has launched a "straight through" recruitment service to help IT departments in the finance sector recruit contract staff. Continue Reading
By -
Feature
21 Mar 2006
Lenovo goes for gold with SMBs
When Shelley Rudman unexpectedly won a silver medal for her valiant efforts in the skeleton at this year’s Winter Olympics, the world knew she’d gained her unprecedented achievement for the UK in a matter of seconds. In fact, the world expected to know the results in that space of time. Continue Reading
- News 07 Mar 2006
-
Feature
02 Mar 2006
Industry chiefs to declare war on for-profit cyber criminals
IT industry leaders reaffirm the importance of security to a digital economy beset by money-driven cyber criminals. Continue Reading
By- Brian McKenna, Senior Analyst, Business Applications
-
News
27 Feb 2006
Not just a big switch
Fibre Channel directors don't just provide lots of ports, they also offer ways to connect disparate SANs, isolate data and devices within a fabric, and configure throughput for specific applications. We look at how the big three directors match up. Continue Reading
By -
Feature
17 Feb 2006
Be careful you don't get more than you pay for with VoIP
Implementing VoIP is attractive for all companies in particular SMBs. However, there are issues to address that may cost you more than what you save Continue Reading
By- Joe O’Halloran, Computer Weekly
-
Feature
09 Jan 2006
Voicing concerns on Skype
Skype has blazed a trail in the Voice over IP arena; its popularity hasn’t gone unnoticed by the hacker community however Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
21 Dec 2005
Sony struggles to regain trust
The company is trying to mend a reputation bruised over its antipiracy practices. One advocate for online civil liberties explains why redemption is a long way off. Continue Reading
By -
News
20 Dec 2005
Guidance turns investigative tools on itself
The forensics software firm says it was compromised by hackers in November. It's just one in a growing list of companies admitting to recent attacks or lax security. Continue Reading
By- Anne Saita, TechTarget
-
News
14 Dec 2005
Flaws reported in Trend Micro ServerProtect
Storage and security managers should be wary of vulnerabilities in the AV product that could enable a denial-of-service and malicious code execution. Workarounds are available. Continue Reading
By -
News
14 Dec 2005
Hospital ditches EMC Centera for long-term archiving
UHCS in Augusta, Ga., is replacing its Centera archiving system from EMC with IBM's GMAS product after performance, reliability and cost issues forced it to seek alternatives. Continue Reading
By- Jo Maitland, TechTarget
-
News
14 Dec 2005
Roundup: 2005's 'curious malicious code'
These viruses, worms and Trojans sometimes escaped our notice. But it didn't get past one antivirus vendor, who rounded up some of the year's stranger offerings from the underground. Continue Reading
By- Anne Saita, TechTarget
-
News
12 Dec 2005
Two Windows patches coming, IE fix uncertain
It remains to be seen whether the software giant on Dec. 13 will address an outstanding Internet Explorer issue that is currently the target of a malicious Trojan. Continue Reading
By- Eric Parizo, Senior Analyst
-
News
12 Dec 2005
Titan Rain shows need for better training
SANS says the Chinese-based attacks demonstrate the growing sophistication of hackers, and the need for IT admins who can articulate the dangers to execs. Continue Reading
By -
News
07 Dec 2005
Security pros gain ground in the board room
Executives are paying more attention to their IT security managers and taking more responsibility for online threats against their companies, according to a new study. Continue Reading
By -
News
06 Dec 2005
Cybersecurity policy takes cooperation, trust, experts say
At the Infosecurity confab, experts explain why sharing information -- even when it's embarrassing -- is vital to securing not only corporations, but also the national infrastructure. Continue Reading
By -
News
30 Nov 2005
Out-of-cycle IE patch may be imminent
Microsoft may release a critical Internet Explorer fix before the next Patch Tuesday, amid reports that malicious code is targeting a memory corruption flaw. Continue Reading
By -
News
29 Nov 2005
By the numbers: The new SOX breakdown
SOX spending for 2006 is expected to be on par with last year but it's not quite dÉjÀ vu all over again. More dough will go to technology. Continue Reading
By- Linda Tucci, Industry Editor -- CIO/IT Strategy
-
News
28 Nov 2005
Who owns and administers the internet's addresses?
Given that IPv4 addresses are a finite resource, we can expect concerns over their distribution to increase in the coming years. Continue Reading
-
News
28 Nov 2005
Step 6: Configuring wireless clients
With wireless networks proliferating it is a good idea to understand what it takes to build a VPN for a wireless gateway. Contributor and Microsoft MVP Brien Posey details the necessary steps in this step-by-step guide. Continue Reading
-
News
21 Nov 2005
Wireless security: Public Wi-Fi could open security holes
A Michigan county is working to give everyone within its borders wireless Internet access. But when it comes to security, users are on their own. Continue Reading
By -
News
20 Nov 2005
Wireless security crucial to railway safety
A transportation firm uses wireless technology to keep the trains running on time. But securing mobile devices isn't easy when they're spread across the globe. Continue Reading
By -
News
16 Nov 2005
Wireless security: Companies deal with software updates
A health care provider found it could use wireless technology to dramatically boost patient care. But first it had to figure out how to deploy security updates over a wireless network. Continue Reading
By -
News
14 Nov 2005
Sony rootkit uninstaller causes bigger threat
Princeton researchers say a security hole that appears when users try to remove Sony's copy protection software presents an even greater risk than the original rootkit. Continue Reading
By -
News
14 Nov 2005
Hackers installing keyloggers at a record rate
iDefense researchers have found that keylogger infections are up 65% over the year before, putting the private data of tens of millions of users at risk. Continue Reading
By -
News
14 Nov 2005
Demand for development skills soars as firms seek business edge
Computer Weekly salary survey shows IT departments eager to secure skills for the future. Continue Reading
-
News
10 Nov 2005
Security Bytes: FTC cracks down on alleged spyware distributors
Patches fix serious RealPlayer flaws, IM malcode launches phishing attacks; Microsoft warns of Macromedia Flash flaw; Liberty Alliance pushes stronger authentication; FEMA data security is in question; patches fix Veritas flaws and TransUnion suffers a security breach. Continue Reading
By- SearchSecurity.com Staff
-
News
09 Nov 2005
Trojans target Sony DRM and Windows
Security researchers track two new Trojan horses. One exploits the Sony DRM program. The other could possibly take aim at the Windows flaw Microsoft patched this week. Continue Reading
By -
News
08 Nov 2005
Sony takes second stab at DRM patch
But a top executive's response to criticism over the company's use of rootkit technology has added fuel to the backlash. Continue Reading
By -
News
24 Oct 2005
Reporter's Notebook: NYC 'controls the software industry'
At Information Security Decisions: a security "rock star" rages against the Microsoft machine; banging the drum for enterprise security; a sour note on zero-day exploits. Continue Reading
By- Michael S. Mimoso, Senior Editor and Anne Saita, News Director
-
News
19 Oct 2005
Elements of a data protection strategy
In this excerpt from Data Protection and Lifecycle Management, Tom Petrocelli addresses the importance of securing data for regulatory compliance and outlines the five components of a data protection strategy. Continue Reading
-
News
17 Oct 2005
How avian flu could threaten IT security
Experts say a potential bird flu pandemic could have a disastrous effect on IT infrastructures. But if companies plan well, those infrastructures could also help minimize chaos. Continue Reading
By -
News
12 Oct 2005
Quiz: What's your infosec IQ?
We've collected our toughest questions to see how well you stand up to a challenge. Put your knowledge to the test and let us know how you do. Continue Reading
-
News
27 Sep 2005
Secure your extended enterprise
How do you achieve the fine balance between ensuring that there is truly free access to sensitive information, without sacrificing security? Continue Reading
- News 26 Sep 2005
-
News
26 Sep 2005
Secure the interests of your extended enterprise
How do you achieve the fine balance between ensuring that there is truly free access to sensitive information and applications from both inside and outside the firewall, without sacrificing security? Continue Reading
-
News
22 Sep 2005
Telework key to surviving security disaster, expert says
Cybersecurity Industry Alliance Executive Director Paul Kurtz explains why telework may be crucial to surviving The Big One. Continue Reading
By -
News
22 Sep 2005
Who best to avert data security disaster: government or business?
People look to government to prevent catastrophe. But in the Information Age, some of those people, namely those working in IT shops, need to do their part to protect us. Continue Reading
By -
News
21 Sep 2005
Leave no trace: Understanding attackers' motives
This excerpt from Chapter 1 of "Rootkits: Subverting the Windows Kernel," explains the purpose of back doors and how hackers use them, as well as how stealth plays a major role in most successful attacks. Continue Reading
-
News
21 Sep 2005
Catastrophic cyberattack unlikely, experts say
Predictions of a cataclysmic disaster have been around for awhile. But one security officer cites reasons why the Internet can never be brought down. Continue Reading
By - News 20 Sep 2005
-
News
20 Sep 2005
SAS drives product roundup
Serial-attached SCSI (or SAS) drives offer significant storage capacity at a much lower cost, while maintaining reasonable performance. Find out who the vendors are in this market. Continue Reading
By- Stephen J. Bigelow, Senior Technology Editor
-
News
20 Sep 2005
Insider threat seen as biggest data security issue
Whether they oversee physical or online defenses, security officers say the disaster scenario that scares them most begins with an insider with malicious intentions. Continue Reading
By -
News
18 Sep 2005
Ensure that legal responsibilities are clear -- Especially when trouble strikes
Excerpt from Chapter 15 of Information Nation Warrior: Information Management Compliance Boot Camp. Continue Reading
-
News
13 Sep 2005
Ofcom liberates BT to offer bespoke pricing
Ofcom has announced proposals to allow BT to offer large business customers bespoke call prices, which should lead to discounts for some companies. Continue Reading
-
News
11 Sep 2005
VoIP turns up the heat on firewalls
New research shows that many organizations are increasingly concerned about VoIP security and plan to augment their firewalls within the next year, changing the landscape of the firewall market. Continue Reading
By- Eric Parizo, Senior Analyst
- News 06 Sep 2005
- News 05 Sep 2005
- News 05 Sep 2005
-
News
05 Sep 2005
IE 7.0 may usher in wave of RSS exploits
Experts warn that Web-feed enhancements in Microsoft's new Web browser may be just the thing crackers need to compromise networks and private data. Continue Reading
By - News 05 Sep 2005
-
News
05 Sep 2005
Extending perimeters
The news that, up until 2006, 70% of successful wireless local area network (WLAN) attacks will be because of the misconfiguration of WLAN access points and client software is disquieting on a number of levels. Continue Reading
-
News
30 Aug 2005
Myfip's Titan Rain connection
LURHQ researchers say the Myfip worm is a good example of the malcode Chinese hackers are using in the so-called Titan Rain attacks against U.S. government networks. Continue Reading
By -
News
30 Aug 2005
Antivirus can introduce dangerous network security holes into any OS
AV software is one of the most basic security steps available. It's also yet another gateway for security breaches. Continue Reading
By- Shawna McAlearney, News Editor
-
News
30 Aug 2005
Passive fingerprinting: Applications and prevention
In this excerpt from the book Silence on the Wire, author Michal Zalewski discusses both malicious and beneficial uses for passive fingerprinting, and how to prevent successful passive fingerprinting on your network. Continue Reading
-
News
26 Aug 2005
High profile breach brings security to top of agenda
There’s nothing like an apparent breach at a global company to concentrate the mind when it comes to information and data security. Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
23 Aug 2005
HP sales boost as restructuring costs
HP reported a 10% increase in sales for the third quarter, and said it would spend $900m (£530m) on redundancy costs in the final quarter. Continue Reading
-
News
16 Aug 2005
Reduce risks of disaster recovery testing
Untested business continuity plans can leave your firm in the lurch, but taking down live environments is risky and complicated. Continue Reading
By- Matt Stansberry, TechTarget
-
News
02 Aug 2005
Raising risk prospects with a new SQL injection threat
"Inference attacks" could deliver up your so-called secure database to an attacker. Continue Reading
By- Shawna McAlearney, News Editor