IT security
-
News
25 Oct 2024
Dutch critical infrastructure at risk despite high leadership confidence
Stark paradox in Dutch cyber security landscape has business leaders expressing high confidence in their IT infrastructure as cyber attacks rise Continue Reading
-
News
11 Jul 2024
Dutch research firm TNO pictures the SOC of the future
In only a few years, security operations centres will have a different design and layout, and far fewer will remain Continue Reading
-
News
26 Nov 2007
Ofcom fines broadband provider
Ofcom has fined broadband provider Prodigy £30,000 for failing to comply with requirements to provide information on how it allows customers to switch broadband provider. Continue Reading
-
News
22 Nov 2007
Security's dirty little secret
When Simon Sharwood met AVG's Larry Bridwell, he learned the security industry's dirty little secret. Continue Reading
By- Simon Sharwood
-
News
21 Nov 2007
Experts: Privacy and security officers living in silos
To better deal with the data breach threat, industry experts say security and privacy officers must break out of their silos and work as a team. Continue Reading
By -
News
20 Nov 2007
Unified communications considerations for 2008
Unified communications (UC) created awareness and confusion in 2007. Next year, UC will reach the masses and be used to its full potential. Continue Reading
By- Andrew R. Hickey
-
News
14 Nov 2007
Home Office awards £650m e-Borders contract
The Home Office has awarded its £650m eBorders contract to a consortium led by Raytheon Systems. Continue Reading
-
News
06 Nov 2007
Adaptec reports losses
Adaptec's revenue was down year over year, as well as sequentially; DataDirect says the InfiniBand business is booming. Continue Reading
By- SearchStorage.com Staff
-
News
06 Nov 2007
CommVault revenues spike after update of Simpana backup app
CommVault attributes a spike in sales to the integration of features such as archiving, replication and search into its backup products. Continue Reading
By -
News
06 Nov 2007
Cisco upgrades Catalyst 4500 and 6500 switches
Cisco today released updates to its modular Catalyst 4500 and 6500 switch series to add more capacity, scalability and redundancy. Continue Reading
By- Andrew R. Hickey
-
News
01 Nov 2007
ISCSI storage gets performance makeover
Suppliers, including Ibrix, Mellanox, Alacritech and EqualLogic, are offering juiced-up new iSCSI configurations, while 3PAR, CipherMax and NeoScale boost data security products. Continue Reading
By- SearchStorage.com Staff
-
News
01 Nov 2007
Riverbed adds disaster recovery features to WAFS
A new version of Riverbed's software will sense when users are doing massive restores over the Wan and optimise traffic accordingly, the company says. Continue Reading
By- Beth Pariseau, Senior News Writer
-
Feature
31 Oct 2007
Vanderbilt hospital fights archive growth with grid
Vanderbilt University Medical Centre simplifies document management using Bycast's archiving grid system. Continue Reading
By- Beth Pariseau, Senior News Writer
-
News
28 Oct 2007
NetApp releases $3K iSCSI SAN
NetApp pushes further down-market with the release of the S300, the latest SMB iSCSI SAN in its StoreVault line. Continue Reading
By- Beth Pariseau, Senior News Writer
-
News
21 Oct 2007
Tackling the backup and recovery challenges of tomorrow
Your data backup and data recovery challenges never stop changing. In this videocast, an EMC executive and a storage analyst discuss the new approaches you'll need to solve tomorrow's backup and recovery challenges. Continue Reading
-
News
21 Oct 2007
Intellectual property lawsuits dog storage industry
The proliferation of patent litigation among data storage companies could stifle technological innovation and drive up costs to the user. Continue Reading
By- Beth Pariseau, Senior News Writer
-
Tip
21 Oct 2007
USB storage devices: Two ways to stop the threat to network security
USB storage devices pose a significant threat to network security. This tip discusses some basic strategies for blocking unauthorized USB device use. Continue Reading
By -
News
14 Oct 2007
SNW Preview: Data protection makes a stand
Led by EMC's integration of data deduplication and CDP into its backup software, data protection products are prominent at Storage Networking World. Continue Reading
By- Dave Raffo, News Director; Beth Pariseau, News Writer
-
News
11 Oct 2007
Juniper updates network access control
Juniper has updated its Unified Access Control NAC products to include better pre- and post-admission, identity and role awareness and other new features. Continue Reading
By- Andrew R. Hickey
-
Feature
10 Oct 2007
Checklist for purchasing hardware-based encryption
Encryption appliances sit inline on a network and use specially designed electronics to encrypt data at line speeds, essentially eliminating the performance penalty imposed by encryption software running on a general server. While software-based encryption is typically handled as a specific event or process (e.g., encrypting data during a backup process), appliance-based encryption normally can handle any quantity of data in flight. Continue Reading
-
News
10 Oct 2007
Researchers warn of new attack methods against Cisco IOS
Several new attack methods against Cisco IOS were uncovered during an analysis conducted by researchers at Information Risk Management. Continue Reading
By -
News
05 Oct 2007
Podcast: the true cost of IT security
In this interview, Cliff Saran speaks to Martin Sadler, director of HP's Trusted Systems Lab, about how much should we be expected to spend and how much security is enough. Hackers are getting smarter and Martin believes newly trained IT professionals are ill-equipped to deal with the sophisticated nature of modern attacks due to limitations in the current way IT security is taught. Continue Reading
By- Cliff Saran, Managing Editor
-
News
04 Oct 2007
Pillar announces support for 1 TB SATA drives
Pillar is one of the earliest to announce 1 TB SATA drives in an enterprise array. IBM's SVC becomes the first storage virtualization product certified with VMware. Continue Reading
By- SearchStorage.com Staff
-
Feature
01 Oct 2007
How to select the right IP PBX
Selecting the right IP PBX system for your company can be complicated. Here are some important things to consider when purchasing an IP PBX. Continue Reading
By -
News
01 Oct 2007
UK will lead £13m study on electronic ID
The UK is to spearhead a £13m pilot project covering 13 European countries to test the interoperability of several electronic identity verification systems. This may eventually give citizens and businesses access to e-government services across the EU, if governments can agree to accept one another's vetting processes. Continue Reading
By -
News
27 Sep 2007
Pacific Hydro finds UTM improves its environment
Renewable energy company Pacific Hydro has found Watchguard's unified threat management devices make a valuable contribution to its defence in depth strategy. Continue Reading
By- Simon Sharwood
-
News
26 Sep 2007
Microsoft releases Windows Server 2008 RC0
Windows Server 2008 Release Candidate 0 (RC0) is now available for customer review. Continue Reading
-
News
25 Sep 2007
How to purchase a data encryption product
Data security is now a critical problem for every company, regardless of size. This buying guide explores the factors involved in purchasing data encryption hardware and software products. Continue Reading
-
News
25 Sep 2007
ITIL v3 Service Operation: FAQs on Book 4
ITIL expert David Pultorak answers common questions about the new ITIL Service Strategy Core Practice Book 1. Continue Reading
By- David Pultorak
-
News
24 Sep 2007
PCI council adds Pin security to remit
The PCI Security Standards Council has added Pin Entry Device (PED) security technology to its payments industry testing portfolio to streamline standardisation. Continue Reading
-
Feature
23 Sep 2007
Storage session downloads: infrastructure track
This track looks at San and Nas issues, virtualization, distance demands, remote offices and how to build out systems. Continue Reading
-
Tip
17 Sep 2007
Bringing the network perimeter back from the 'dead'
Many have expressed the importance of endpoint security, going so far as to say the perimeter is dead. Not so fast, says network security expert Mike Chapple. Continue Reading
By- Mike Chapple, University of Notre Dame
-
News
16 Sep 2007
Communications-as-a-service taking hold
Communications-as-a-service is taking hold worldwide as a viable hosted IP telephony system. Continue Reading
By- Andrew R. Hickey, News Editor
-
News
16 Sep 2007
NAC switches, appliances help track users, malware
Some vendors are offering switches and appliances to monitor traffic for malware and unauthorized access, as the NAC market sorts itself out. Continue Reading
By- Neil Roiter, TechTarget
-
News
09 Sep 2007
Virtual appliance lets users convert DAS to iSCSI San
LeftHand Networks has released an edition of its SaniQ iSCSI San software that will convert locally attached disc to networked storage. Continue Reading
By- Beth Pariseau, Senior News Writer
-
News
07 Sep 2007
Microsoft update to patch critical Windows flaw
Microsoft plans to patch a critical flaw in Windows and plug holes in MSN Messenger, Visual Studio, and Windows services for Unix. Continue Reading
By- SearchSecurity.com Staff
-
News
07 Sep 2007
Government warns of dangerous QuickBooks Online flaw
Attackers could exploit two flaws in the popular Intuit QuickBooks Online Edition to cause buffer overflows and download or upload files in arbitrary locations, US-CERT warned. Continue Reading
By -
News
07 Sep 2007
Cybercriminals employ toolkits in rising numbers to steal data
The market is increasing for crimeware toolkits that help cybercriminals avoid detection and exploit flaws, according to new research from security vendor, Finjan. Continue Reading
By- Robert Westervelt, TechTarget
-
Feature
06 Sep 2007
Understanding VoWLAN
Like VoIP, VoWLAN contributes to cost efficiency. Because calls can be routed over the data network internally or over the Internet externally, mobile telephony costs can be eliminated or decreased significantly. In the long term, VoWLAN deployment is a significant step toward interoperability and seamless mobile connectivity between private WLANs and public wireless and cellular networks. Continue Reading
-
News
06 Sep 2007
Data security breach at Pfizer affects thousands
A Pfizer employee removed files exposing 34,000 people to potential identity fraud, according to the company. It was the third data breach at the company in three months. Continue Reading
By- SearchSecurity.com Staff
-
News
05 Sep 2007
NAC switches, appliances help track users, malware
Some vendors are offering switches and appliances to monitor traffic for malware and unauthorized access, as the NAC market including Cisco NAC and Microsoft NAP sorts itself out. Continue Reading
By- Neil Roiter, TechTarget
-
News
05 Sep 2007
Firefox security issues persist despite update
Despite Mozilla's recent Firefox security update, researchers say there's another way attackers could exploit the browser for malicious purposes. Continue Reading
By -
News
02 Sep 2007
Now the dust has settled on pornography filtering...
Andrew Collins looks at the controversial topic of Internet porn filtering in Australia, now that the federal government has enacted its hotly debated plans. Continue Reading
By- Andrew Collins
-
Feature
31 Aug 2007
User performs data storage U-turn
U-Store-It, a national self-storage company, decentralized its data centers, migrated data from SAN to DAS and de-clustered Exchange to simplify storage management. Continue Reading
By- Beth Pariseau, Senior News Writer
-
News
30 Aug 2007
Network access control vendors: Attraction vs. retention
Network access control (NAC) vendors were evaluated based on attractiveness and customer retention in a recent survey by Current Analysis. Continue Reading
By- Andrew R. Hickey
-
News
29 Aug 2007
Rootkit found in older Sony USB device
F-Secure says it discovered rootkit technology in Sony's Micro Vault USM-F fingerprint reader software. The find comes two years after controversy over Sony's DRM technology. Continue Reading
By -
Feature
29 Aug 2007
SaaS apps being deployed by business units, not IT
When it comes to deploying applications via SaaS, IT is still behind the curve. What's preventing IT from getting control over the programs business units want? Continue Reading
By- Shamus McGillicuddy, Enterprise Management Associates
-
News
28 Aug 2007
Unified communications slow to change U.S. work culture
Unified communications implementation is still high, but many enterprises have yet to allow users all its advantages. Continue Reading
By- Kate Dostart, Associate Editor
-
News
28 Aug 2007
Data archives overview
When a file is lost due to user error, or data is corrupted because of system problems, the affected data can be restored from a backup. An archive is different from a backup because the data may not be used for months, even years, but must be accessed quickly when needed. There is simply no time to search through burgeoning volumes of tape or optical media to locate important files. Traditional backup platforms are poorly suited for archival data storage, and users are relying on disk storage systems for a mix of performance and reliability. Files can be archived to any disk storage system, but content-addressed storage (CAS) technology has appeared to support archiving efforts. Continue Reading
By- Stephen J. Bigelow, Senior Technology Editor
-
News
28 Aug 2007
SANS: Attackers may be attempting Trend Micro exploits
The SANS Internet Storm Center (ISC) warns that attackers may be attempting to exploit flaws in Trend Micro products to hijack computer systems. Continue Reading
By -
News
23 Aug 2007
Nokia Intellisync boosts device management
Nokia Intellisync has released updates to its Mobile Suite to enhance remote device support, loss and theft protection, and management capabilities. Continue Reading
By- Andrew R. Hickey, News Editor
-
Feature
23 Aug 2007
Experts: IDS is here to stay
IDS technology has survived predictions that it would be replaced by IPS. One expert says it will remain a separate product while IPS is folded into firewalls. Continue Reading
By -
News
22 Aug 2007
Trend Micro fixes flaws in ServerProtect, PC-cillin
Attackers could tamper with servers and run malicious code by exploiting flaws in Trend Micro's ServerProtect, Anti-Spyware and PC-cillin products. But fixes are available. Continue Reading
By -
News
22 Aug 2007
Microsoft adds CA vets to anti-malware team
Microsoft has hired Jakub Kaminski, one of CA's more talented and well-regarded antivirus researchers, and three of his colleagues from CA's Australian lab. Continue Reading
-
News
22 Aug 2007
Attackers target two Microsoft security flaws
Symantec warned customers about attacks targeting two Microsoft security flaws -- an unpatched DirectX Media vulnerability and the XML Core Services flaw patched in MS07-042. Continue Reading
By -
Feature
21 Aug 2007
Backup reporting expands to add capacity planning
Aptare adds capacity planning for primary data storage to its product line, joining Symantec in recent attempts to broaden the appeal of reporting software. Continue Reading
By- Beth Pariseau, Senior News Writer
-
News
21 Aug 2007
Nigel Phair, author of 'Cybercrime: The Reality of the Threat', on Australia's response
In the first instalment of a three part interview, TechTarget Australia's Patrick Gray interviews Australian Federal Police Agent Nigel Phair about his new book: Cybercrime: The Reality of the Threat. Until recently, Phair was the Team Leader of Investigations at the Australian High Tech Crime Centre (AHTCC) in Canberra. Continue Reading
By- Patrick Gray
-
News
20 Aug 2007
Sourcefire acquires open source ClamAV
Sourcefire, maker of the popular Snort open source IDS tool, has acquired ClamAV, an open source email gateway scanning tool. Continue Reading
By -
News
20 Aug 2007
VMware acquires HIPS provider Determina
VMware, the leader in virtualization software, has acquired Determina, a provider of host IPS technology. Continue Reading
-
News
19 Aug 2007
College campuses prepare for Microsoft Vista challenges
With new Vista machines coming to campus, the IT shops of academia have no choice but to embrace the latest Windows OS and its security implications. Continue Reading
By -
News
17 Aug 2007
Wal-Mart deploys new data security system
Wal-Mart Stores has deployed a data security and encryption system to secure data going over its global network. Continue Reading
-
Tip
16 Aug 2007
Network analysis -- Enhancing security assessments
Network security assessment doesn't have to rely on expensive automated tools. In this tip, learn how to use data from freely available tools to produce a comprehensive view of network security. Continue Reading
By- Dave Piscitello
-
News
16 Aug 2007
TJX profit takes hit over data breach
TJX says it has spent $256 million responding to the massive data breach that exposed 45 million customers to identity fraud, and the bottom line has suffered as a result. Continue Reading
By- SearchSecurity.com Staff
-
Feature
16 Aug 2007
Firewall deployment options increase for enterprises
With a growing number firewall configuration options, companies need to spend more time and put more effort into determining how to design and deploy firewalls. Continue Reading
-
News
15 Aug 2007
Latest Microsoft flaws affect Windows, IE, Excel
Microsoft released nine security updates Tuesday -- six of them critical -- for flaws in Internet Explorer, Excel and other programs within the Windows OS. Continue Reading
By -
Tip
15 Aug 2007
How to test Snort
VARs should test Snort to ensure the open source IDS is detecting malicious activity. Continue Reading
-
News
14 Aug 2007
Novell to acquire Senforce for endpoint security
Novell is acquiring Senforce, an early network access control supplier, to integrate its endpoint security features and develop an endpoint management suite. Continue Reading
By- Robert Westervelt, TechTarget
-
News
14 Aug 2007
Apple iPhone to provoke complex mobile attacks, expert warns
Mikko Hypponen, director of antivirus research at F-Secure, said he expects mobile malware attacks to escalate thanks to interest in Apple's iPhone. Continue Reading
By -
News
14 Aug 2007
Telstra network build spurs new security plan
Telstra's experience constructing the Next G and Next IP networks has seen the telco evolve a new security strategy. Continue Reading
By- Simon Sharwood
-
News
13 Aug 2007
VoIP vulnerability threatens data
VoIP vulnerabilities have now reached a level of sophistication that allows hackers to steal, view or delete data. Continue Reading
By- Andrew R. Hickey
-
News
13 Aug 2007
Gartner security summit outlines 'Security 3.0'
Gartner has opened its Sydney Security Summit with a definition of Security 3.0. Continue Reading
By- Simon Sharwood with Andrew Collins
-
Feature
12 Aug 2007
VoIP models and services: Complete guide
With clear, concise explanations of existing VoIP business models and deployment methodologies, this guide will enable you to weigh the pros and cons of each based on your needs. Continue Reading
-
News
09 Aug 2007
NAS appliance purchase considerations
NAS appliances are frequently touted for bringing convenience and simplicity to network storage. Appliances include their own dedicated disks for storage and RAID, and most NAS appliances can be upgraded with more or larger disks for additional storage space. However, NAS appliances do pose some disadvantages. Consequently, the choice of NAS appliance requires careful evaluation. Now that you've reviewed the essential issues involved in any NAS product, this guide focuses on specific considerations for dedicated NAS appliances. You'll also find a series of specifications to help make on-the-spot product comparisons between vendors. Continue Reading
-
News
09 Aug 2007
Sun adds virtual tape library to Thumper
Analysts say the combo of FalconStor's software, Solaris and Thumper is a good sign of integration from Sun after a disorganised year, but it's unclear if users will be convinced. Continue Reading
By- Beth Pariseau, Senior News Writer
-
News
09 Aug 2007
Cisco warns of critical IOS flaws
Attackers could exploit multiple flaws in Cisco's IOS to cause a denial of service or remotely execute arbitrary code. Continue Reading
By- SearchSecurity ANZ Staff
-
News
09 Aug 2007
VeriSign employee data exposed in laptop theft
Current and former employees of VeriSign were exposed to potential data fraud when a laptop housing their information was stolen from the car of a former employee. Continue Reading
By -
News
09 Aug 2007
VoIP vulnerability threatens data
VoIP vulnerabilities have now reached a level of sophistication that allows hackers to steal, view or delete data. Continue Reading
By- Andrew R. Hickey, News Editor
-
News
09 Aug 2007
Immunity releases new exploit-writing tool
Pen testing company says its Debugger tool offers researchers a new way to write exploits, analyse malware and reverse engineer binary files. Continue Reading
By -
News
08 Aug 2007
NAS appliance specifications
NAS appliances are noted for their convenience, offering dedicated internal storage that is relatively straightforward to identify and manage. The biggest issue for NAS appliances is avoiding network bottlenecks and supporting expansion without having to proliferate additional appliances across the network. The product snapshots in this chapter highlight key specifications for a cross section of major NAS appliance products. Continue Reading
-
News
08 Aug 2007
Cisco warns of critical IOS flaws
Attackers could exploit multiple flaws in Cisco's IOS to cause a denial of service or remotely execute arbitrary code. Continue Reading
By- SearchSecurity.com Staff
-
News
08 Aug 2007
Wi-Fi simplicity edging out Wi-Fi security
Experts say the standards are available to lock down Wi-Fi, but many network and security managers are taking an easier approach. Continue Reading
By- Eric Parizo, Senior Analyst
-
News
08 Aug 2007
EMC's RSA to acquire Tablus for data loss prevention
RSA, the security division of EMC Corp., said it planned to acquire Tablus, a maker of sensitive data scanning and classification tools and data protection software. Continue Reading
-
Feature
07 Aug 2007
How to cheat at VoIP Security
Securing a VoIP infrastructure requires planning, analysis, and detailed knowledge about the specifics of the implementation you choose to use. Continue Reading
-
News
07 Aug 2007
Subpar security compromises compliance
Pressure to keep trading applications available has nudged security to the back of the development line. Continue Reading
-
Feature
06 Aug 2007
Does compliance make encryption always necessary?
Many organisations look to encryption to protect sensitive data. Yet hundreds of millions of people who use the Internet also use encryption, yet most of them don't even know it. Continue Reading
-
News
06 Aug 2007
Researchers wrangle petabytes of data storage with NAS, tape
Scientists at Cern's LHC say dozens of petabytes require custom-built NAS systems and data migration software, but commercial tape drives are mostly up to snuff. Continue Reading
By- Beth Pariseau, Senior News Writer
-
News
03 Aug 2007
Discovery of malware cesspool triggers attack fears
Trend Micro researchers say a malware-infested Web server in Russia, linked to several Italian Web sites, could lead to a large-scale attack. Continue Reading
By- SearchSecurity.com Staff
-
News
02 Aug 2007
Apple releases fixes for Mac OS X, iPhone vulnerabilities
Apple Computer has released software patches fixing critical vulnerabilities in Mac OS X and its newly released iPhone. Continue Reading
By- Edmund X. DeJesus, Contributor
-
News
01 Aug 2007
Users make iSCSI Sans with USB keys
Users say that Open-E's iSCSI San software, which is delivered on a USB stick, is more affordable than prepackaged systems and has more support than free iSCSI target products. Continue Reading
By- Beth Pariseau, Senior News Writer
-
News
01 Aug 2007
Black Hat 2007: Researchers highlight new database attack method
At this week's hacker confab, expert penetration testers will demonstrate how cyberthieves can reach into corporate databases -- without exploiting a specific software flaw -- to steal credit card and Social Security numbers. Continue Reading
By -
News
31 Jul 2007
Attackers ultimately drive security market, analyst says
The security market is being driven by spam gangs, cyberthieves and other criminals bent on hacking into company and government databases to steal sensitive information. Continue Reading
By- Robert Westervelt, TechTarget
-
News
31 Jul 2007
Security update fixes Yahoo Widgets flaw
Attackers could exploit a Yahoo Widgets flaw to run malicious code on compromised Windows computers, but a security update is available. Continue Reading
By -
News
31 Jul 2007
Cisco knocks out Avaya as IP PBX heavyweight
IP PBX adoption is rising as Cisco and Avaya square off for market dominance. Continue Reading
By- Andrew R. Hickey
-
News
30 Jul 2007
Most antispam technologies get failing grade
An independent study finds that many enterprises are not satisfied with traditional antispam technologies. Continue Reading
By- Robert Westervelt, TechTarget
-
News
26 Jul 2007
Stop simultaneous connections to corporate LANs and external Wi-Fi networks
How can you stop simultaneous connections to corporate LANs and external Wi-Fi networks? Find out from expert Lisa Phifer. Continue Reading
By- Lisa Phifer, Core Competence
-
News
25 Jul 2007
EMC reports Clariion surge, data archiving slump
EMC's revenues are up this quarter, attributed in part to a big boost in Clariion sales, but CEO Joe Tucci is critical of the company's execution in data archiving. Continue Reading
By- Beth Pariseau, Senior News Writer
-
News
25 Jul 2007
Cisco issues warning for wireless LAN controller flaws
Cisco Systems is warning customers of flaws in its wireless LAN controllers that initially crippled a wireless network at Duke University. Continue Reading
By- Robert Westervelt, TechTarget
-
News
24 Jul 2007
Apple iPhone crack discovered by security researchers
Researchers have found a way to take complete control of the Apple iPhone by sending a user to a malicious Web site. Continue Reading
-
News
24 Jul 2007
New hacking technique exploits common programming error
Researchers at Watchfire Inc. say they discovered a new technique that exploits a common dangling pointer error. Continue Reading
-
News
23 Jul 2007
PCI compliance costs often underestimated, study finds
Companies are moving forward with PCI DSS projects, but many are underestimating the costs associated with compliance. Continue Reading
By- Robert Westervelt, TechTarget
-
News
23 Jul 2007
Core Security CEO to step down
Paul Paget, the CEO of penetration testing software vendor Core Security Technologies said he is better-suited for start-ups Continue Reading
-
News
22 Jul 2007
Black Hat Las Vegas 2007: Special news coverage
SearchSecurity.com covers all the controversy at this year's show with news, features, podcasts, interviews, exploits and more direct from Las Vegas. Continue Reading