Browse Definitions :
81,667 results for:

Cisco boosts VoIP certification

News | ComputerWeekly.com

The upgraded CCNP midlevel Cisco certification now incorporates VoIP, security and wireless to boost converged network skills among enterprise ...

Security Blog Log: Israeli-Hezbollah war spills into cyberspace

News | ComputerWeekly.com

This week blogosphere warily watches online attacks inspired by the Mideast conflict and rants over the latest security incidents at AOL and the VA.

Mozilla issues critical security updates

News | ComputerWeekly.com

New patches to fix 13 software security flaws, eight of which have been deemed critical.

Microsoft patches seven July security holes, five critical

News | ComputerWeekly.com

The software giant's monthly batch of fixes includes critical repairs for Internet Explorer and Windows' networking features, plus "important" ...

Midsized firms reach out to backup service providers

News | ComputerWeekly.com

Data growth and ever-tightening compliance rules are among the factors driving some organizations to turn to service providers for help with backups.

AT&T breach affects 19,000 customers

News | ComputerWeekly.com

Online outlaws hacked into an AT&T computer system and stole credit card data on thousands of customers. AT&T has offered to pay for credit ...

Twelve Microsoft fixes coming on Patch Tuesday

News | ComputerWeekly.com

Microsoft Tuesday will release a dozen new security bulletins for its Windows and Office products, likely including fixes for several outstanding ...

Should I back up the operating system files?

News | ComputerWeekly.com

We hear a lot about single-instance storage; single-instance backup. When you start backing up operating system files, you will have the same .DLL, ...

Security Bytes: CA fixes eTrust Antivirus flaws

News | ComputerWeekly.com

Online thieves steal $700,000 from personal accounts, researchers expose e-passport vulnerability; and arrests are made in the VA security breach ...

Three ways to create clustered storage, page 2

News | ComputerWeekly.com

Clustered storage systems run on storage servers, NAS gateways and hosts. Here's how to determine which clustered file-system architecture is best ...

Critical flaws found in Excel, Flash Player

News | ComputerWeekly.com

FrSIRT says holes in Microsoft's spreadsheet program and Adobe's media player could allow attackers to take control of affected machines and initiate...

CSI survey: Data breaches still being swept under the rug

News | ComputerWeekly.com

The annual CSI/FBI Computer Crime and Security Survey shows companies are reporting fewer financial losses from data breaches. That doesn't mean the ...

Flaw found in Firefox 2.0

News | ComputerWeekly.com

Attackers could exploit the security flaw to crash versions 1.5.0.7 and 2.0 of the browser, according to various security advisories.

TNT to provide staff with e-mail smartphones rather than laptops

News | ComputerWeekly.com

Logistics company TNT is to provide up to 700 staff worldwide with mobile e-mail, using the Nokia Communicator 9500 smartphone as...

Business continuity: Keep on running

Feature | ComputerWeekly.com

Too many plans for business continuity do not reflect the true risks. Sally Flood looks at risk assessment and the creation a realistic strategy.

Pre-CISSP: Options for the security newbie

News | ComputerWeekly.com

Shon Harris advises novice security practitioners on the value of entry-level certifications -- and good, old-fashioned experience -- in preparation ...

Shifting services back indoors

News | ComputerWeekly.com

Almost a quarter of blue chip firms in the UK are so disillusioned with outsourcing they are hauling their services back in-house.

Sleep out to help homeless children

News | ComputerWeekly.com

The annual Byte Night charity sleep-out will take place on 22 September at London’s Victoria Tower Gardens on the Embankment next to the House of ...

Inside MSRC: Debunking Excel exploits

Feature | ComputerWeekly.com

Microsoft's Christopher Budd puts the magnifying glass to Microsoft's July bulletinsand says one alleged Excel exploit isn't what it seems.

An era ends as Tandberg buys Exabyte

News | ComputerWeekly.com

The once-dominant player in the tape market has ended a long downward spiral by selling off its assets. At least customers can now count on continued...

Ajax threats worry researchers

News | ComputerWeekly.com

Black Hat: While it makes smooth Web applications like Google Maps possible, the rush to adopt Ajax may fuel haphazard development and a feeding ...

AOL data spill leads to dismissals, resignation

News | ComputerWeekly.com

AOL has fired two employees and its CTO has left the company after search data from 658,000 customers was accidentally exposed earlier this month.

Arun Taneja: Blogs and more

News | ComputerWeekly.com

Monthly blogs by Arun Taneja, as well as other material by this storage expert.

Vendors reject preferential knowledge sharing

News | ComputerWeekly.com

While Cisco continues to investigate a potential PIX firewall flaw, it and other vendors say sharing security information quickly and ...

Virtualisation eases patch management pain

News | ComputerWeekly.com

IT managers are learning that using desktop virtualisation software to patch their enterprise desktops has the potential to save time, money and ...

VoIP call quality on the decline

News | ComputerWeekly.com

Advances in technology have made VoIP more common, but that hasn't stopped VoIP call quality from dropping steadily over the last 18 months, ...

Twin Trojans use PowerPoint to spread

News | ComputerWeekly.com

Researchers aren't yet sure if troublesome new Trojan horse programs are exploiting a new PowerPoint flaw or the vulnerabilities Microsoft patched ...

Third-party patching: Prudent or perilous?

News | ComputerWeekly.com

Security patches issued by third parties have become more prevalent in recent months, and while some security pros endorse them, others say they're ...

Vista kernel limits have security vendors on edge

News | ComputerWeekly.com

Microsoft's PatchGuard feature will prevent extension of Windows Vista kernel, and antivirus vendors say it'll make it harder for them to produce ...

IBM spruces up storage line

News | ComputerWeekly.com

IBM floated a raft of announcements across its storage line, but analysts say they are still waiting for the updates stuck in the research phase.

IT bosses preparing for Byte Night

Feature | ComputerWeekly.com

About 250 senior IT professionals will take part in the annual Byte Night charity sleep-out on London’s Embankment on 22 September in an effort to ...

Cheat sheet: Access management solutions and their pros and cons

News | ComputerWeekly.com

Popular authentication methods such as passwords, biometrics and two-factor are assessed in this chart.

Cisco struggles with SIP firewall flaw

News | ComputerWeekly.com

Cisco admits it can't reproduce a SIP security flaw in its PIX firewall that was first identified by a researcher at Black Hat.

EMC updates SAN Advisor design tool

News | ComputerWeekly.com

EMC's SAN design tool now recognises zones and allows users to customise rules; HP and EMC sign five-year cross-licensing deal.

Emulex acquisition could cloud future of FC-SATA spec

News | ComputerWeekly.com

New Emulex subsidiary Sierra Logic's strength is in FC-SATA bridging technology. Meanwhile, ONStor launches midrange clustered NAS, and Quantum ...

FullArmor lives up to its name

News | ComputerWeekly.com

PolicyPortal provides an Internet interface to easily configure, monitor and enforce near real-time Active Directory-based policy compliance through ...

Data Connections launches security for datacentre product line

News | ComputerWeekly.com

Data Connections, a provider of complete datacentre solutions, has launched - in partnership with NetClarity - RockSolid, a program designed to ...

Cost of Libra magistrates system trebles

News | ComputerWeekly.com

The Department of Constitutional Affairs has admitted that the cost of the Libra case management system for magistrates courts will rise to £487m – ...

EMC sheds light on RSA integration plans

News | ComputerWeekly.com

As the dust begins to settle on EMC's $2.1 billion acquisition of RSA Security, the hard work of integration begins. What's EMC strategy here?

Endpoint security quiz answers

Feature | ComputerWeekly.com

The answers to the Endpoint quiz

Business continuity keeps companies running

Feature | ComputerWeekly.com

As we speak, it appears that disruption to IT services by the London bombings was minimised due to effective and realistic business continuity ...

A new era of computer worms: Wireless mobile worms

News | ComputerWeekly.com

In this excerpt of Chapter 9 from "The Art of Computer Virus Research and Defense," author Peter Szor dissects the Cabir worm.

Quiz: Identify and analyze Web server attacks

News | ComputerWeekly.com

Test your knowledge of the material covered in the "Identify and analyze Web server attacks" section of Intrusion Defense School.

Quiz: Identify and analyze Web server attacks, answer No. 2

News | ComputerWeekly.com

Quiz: Identify and analyze Web server attacks, answer No. 2

Quiz: Secure Web directories and development, answer No. 5

News | ComputerWeekly.com

Quiz: Secure Web directories and development, answer No. 5

Quiz: Identify and analyze Web server attacks, answer No. 3

News | ComputerWeekly.com

Quiz: Identify and analyze Web server attacks, answer No. 3

Quiz: Secure Web directories and development, answer No. 1

News | ComputerWeekly.com

Quiz: Secure Web directories and development, answer No. 1

Quiz: Secure Web directories and development, answer No. 2

News | ComputerWeekly.com

Quiz: Secure Web directories and development, answer No. 2

Atos wins DWP deal extension

News | ComputerWeekly.com

The Department for Work and Pensions has renewed a contract with IT services company Atos Origin to deliver medical advice and...

Tight contract management vital, users told at SSRG debut

News | ComputerWeekly.com

The Strategic Supplier Relationships Group, which brings together 10 of the UK's most influential IT user groups, was formally...

Combining technology and social engineering: Hacking behind bars

News | ComputerWeekly.com

In this excerpt from Chapter 11 of "The Art of Deception: Controlling the Human Element of Security," authors Kevin Mitnick and William L. Simon ...

Sarbox draining corporate security budgets

News | ComputerWeekly.com

Corporate investment to comply with the Sarbanes-Oxley data security legislation has come at the expense of dealing with other security threats, ...

Pop quiz: E-mail security

News | ComputerWeekly.com

Find out how much you know about securing your organization's e-mail.

Sarbox challenge drains security budgets

News | ComputerWeekly.com

International corporate spending on compliance with the Sarbanes-Oxley data security legislation has come at the expense of dealing with other ...

ControlGuard targets rogue devices

News | ComputerWeekly.com

ControlGuard Access Manager is an effective tool for controlling what devices users can add to their workstations and how they are used.

Fast Guide: VoIP encryption

News | ComputerWeekly.com

A guide to encryption within VoIP networks

Dell and EMC: Five more years

News | ComputerWeekly.com

Dell leans on EMC for support in the face of an SEC investigation and possible delisting from NASDAQ.

Dundee to teach ethical hacking BSc

News | ComputerWeekly.com

A degree in ethical hacking will be on offer at a Scottish university from the new academic year.

Automated provisioning quiz

News | ComputerWeekly.com

Take this five-question quiz to see how much you've learned about automated provisioning.

How do I establish recovery priority for my applications?

News | ComputerWeekly.com

If it's at the IT level, it comes from a data perspective. When you start moving up a little bit into the business side, people start looking at the ...

Looking ahead to life without passwords

News | ComputerWeekly.com

Security pros know that passwords are nothing but trouble. For them, single-sign on, two-factor authentication and federated ID represent the path to...

VPNs and remote access quiz

News | ComputerWeekly.com

Take this five-question quiz to see how much you've learned about VPNs and remote access.

Longhorn on the road to Linux compatibility

News | ComputerWeekly.com

The next version of Windows Server – codenamed Longhorn – will include virtualisation technology that is interoperable with the open source Linux ...

Apple fixes Xsan security flaw

News | ComputerWeekly.com

Attackers could exploit a security flaw in Apple's Xsan file system to launch malicious code and crash vulnerable machines, but a fix is available.

3PAR adds midrange array for secondary sites

News | ComputerWeekly.com

3PAR has introduced a smaller version of its InServ Storage Server, which it describes as a product-line extension into its existing customer base.

Users cautious about Brocade-McData merger

News | ComputerWeekly.com

Customers are worried about McData switches interoperating with other products and how Brocade will handle product overlap.

Bosses welcome security warnings from outsiders

Feature | ComputerWeekly.com

Security Bytes: Exploits targeting freshly patched Apple flaw

News | ComputerWeekly.com

Apple patches nearly two dozen holes in OS X, but not before exploits are unleashed. Plus McAfee fixes a critical flaw and EMC gets the OK to buy RSA.

Survey: Data breaches difficult to spot, prevent

News | ComputerWeekly.com

IT pros worry that false positives and a lack of resources are preventing them from blocking data breaches

Symantec CIO vies with virtualization, device policy

News | ComputerWeekly.com

Symantec CIO David Thompson says virtualization is a big part of the security giant's future and it has developed a policy to mitigate virtualization...

Symantec fixes Backup Exec flaw

News | ComputerWeekly.com

Attackers could exploit flaws in Symantec Backup Exec 9.1 and 9.2 for NetWare Servers to cause a denial of service, launch malicious code and gain ...

Security Blog Log: Opinions abound on IBM/ISS deal

News | ComputerWeekly.com

Bloggers ponder what IBM's acquisition of ISS says about the industry as a whole. Is the end in sight for independent security vendors?

IXEurope heads trial of increased security between datacentres

News | ComputerWeekly.com

IXEurope, one of Europe’s fastest growing datacentre services companies, and idQuantique, a quantum cryptography company, have agreed to set up a ...

Automated provisioning quiz answers

Feature | ComputerWeekly.com

the key questions answered

Secure network perimeter to result from Symantec-Juniper deal

News | ComputerWeekly.com

Juniper and Symantec announced a deal to integrate Symantec's client security software with Juniper's security hardware. The result will allow ...

Answers: VPN and remote access know-how quiz

News | ComputerWeekly.com

the crucial questions answered

VoIP still a confusing area for SMBs

News | ComputerWeekly.com

A study released at today's VON conference in Boston suggests that SMBs -- despite their growing use of VoIP -- are still confused about VoIP ...

VoIP startup untethers would-be mobile workers from wireline office phones

News | ComputerWeekly.com

VoIP startup DiVitas Networks has voice-over-WiFi-to-cellular technology in the works that gives endusers access to enterprise apps and puts ...

Endpoint security quiz

Feature | ComputerWeekly.com

Take this five-question quiz to see how much you've learned about endpoint security.

Information Security Decisions Session Downloads

News | ComputerWeekly.com

Session Downloads from Information Security Decisions 2006 Conference.

Mobile security begins with policy

News | ComputerWeekly.com

Mobile security can no longer be an afterthought. Mobile experts say security starts, but doesn't end, with policy.

Mocbot update targets MS06-040 flaw

News | ComputerWeekly.com

Security experts raised the red flag Sunday as new malware targets the Windows flaw addressed in the MS06-040 patch. Attackers are using the flaw to ...

RFID security issues are cause for corporate concern

News | ComputerWeekly.com

Although small in nature, RFID tags could be used to attack databases and corrupt critical information. It's a growing concern as corporate RFID use ...

Riverbed update offers users more bandwidth, better reporting

News | ComputerWeekly.com

Riverbed announced a package of hardware and software updates, which some customers say they've been waiting for.

Risk management: Data organization and impact analysis

Feature | ComputerWeekly.com

This first article of the Insider Risk Management Guide explains how to data organization is the first step in implementing insider threat controls.

Security Bytes: Data breach affects 100,000 military personnel

News | ComputerWeekly.com

Meanwhile: Phishers use a phone trick to dupe PayPal users; the PCI security standard will get more teeth and a survey illustrates an increase in ...

Risk management: Implementation of baseline controls

Feature | ComputerWeekly.com

This fourth article in the Insider Risk Management Guide examines the implementation of baseline controls.

Questions that need to be answered on NHS IT plan

Feature | ComputerWeekly.com

Four years ago the government announced to a grateful NHS a national IT programme that would become the world's largest civil computer scheme.

Not just a big switch

News | ComputerWeekly.com

Fibre Channel directors don't just provide lots of ports, they also offer ways to connect disparate SANs, isolate data and devices within a fabric, ...

Industry chiefs to declare war on for-profit cyber criminals

Feature | ComputerWeekly.com

IT industry leaders reaffirm the importance of security to a digital economy beset by money-driven cyber criminals.

MEF drives up quality standards in carrier Ethernet

News | ComputerWeekly.com

The Metro Ethernet Forum (MEF) has expanded its certification program to include quality of service parameters in network kit, to ensure service ...

Data storage compliance's impact on storage product choices

News | ComputerWeekly.com

Data storage compliance is having a tremendous impact on the storage organization, as well as the management practices employed to retain, search, ...

Silver Peak expands datacentre disaster recovery

News | ComputerWeekly.com

Silver Peak Systems, a provider of network acceleration solutions, has unveiled its NX-5500 network acceleration appliance.

Risk management: Baseline management and control

Feature | ComputerWeekly.com

Identifying baseline controls is the second step to implementing insider threat controls as described in this article from SearchSecurity's Insider ...

Qualcomm to halve storage growth in 2007

News | ComputerWeekly.com

Wireless chipmaker Qualcomm expects to slow down its storage growth by at least 50% next year using a capacity utilisation tool from MonoSphere.

Preparing for 'little disasters' often neglected

News | ComputerWeekly.com

Tom Dugan, CTO of Recovery Networks, says it's common for users to prepare to lose an entire building -- but aren't ready for small-scale losses &...

Skills fears as number of IT students plummets

News | ComputerWeekly.com

Microsoft offers SMBs all-in-one security and protection

News | ComputerWeekly.com

Small- to medium-sized businesses (SMBs) are among the key targets of Microsoft's latest solution, Windows Live OneCare.

Blade servers stand out in sluggish server arena

News | ComputerWeekly.com

A survey by IDC has shown that blade servers were among few highlights in a generally sluggish worldwide server market in the first quarter of 2006.

Employee monitoring should be done with care

News | ComputerWeekly.com

Employee monitoring is on the rise as firms try to safeguard their sensitive information and increase productivity.

Networking
  • network scanning

    Network scanning is a procedure for identifying active devices on a network by employing a feature or features in the network ...

  • networking (computer)

    Networking, also known as computer networking, is the practice of transporting and exchanging data between nodes over a shared ...

  • What is SD-WAN (software-defined WAN)? Ultimate guide

    Software-defined WAN is a technology that uses software-defined networking concepts to distribute network traffic across a wide ...

Security
  • identity management (ID management)

    Identity management (ID management) is the organizational process for ensuring individuals have the appropriate access to ...

  • single sign-on (SSO)

    Single sign-on (SSO) is a session and user authentication service that permits a user to use one set of login credentials -- for ...

  • fraud detection

    Fraud detection is a set of activities undertaken to prevent money or property from being obtained through false pretenses.

CIO
  • IT budget

    IT budget is the amount of money spent on an organization's information technology systems and services. It includes compensation...

  • project scope

    Project scope is the part of project planning that involves determining and documenting a list of specific project goals, ...

  • core competencies

    For any organization, its core competencies refer to the capabilities, knowledge, skills and resources that constitute its '...

HRSoftware
  • Workday

    Workday is a cloud-based software vendor that specializes in human capital management (HCM) and financial management applications.

  • recruitment management system (RMS)

    A recruitment management system (RMS) is a set of tools designed to manage the employee recruiting and hiring process. It might ...

  • core HR (core human resources)

    Core HR (core human resources) is an umbrella term that refers to the basic tasks and functions of an HR department as it manages...

Customer Experience
  • martech (marketing technology)

    Martech (marketing technology) refers to the integration of software tools, platforms, and applications designed to streamline ...

  • transactional marketing

    Transactional marketing is a business strategy that focuses on single, point-of-sale transactions.

  • customer profiling

    Customer profiling is the detailed and systematic process of constructing a clear portrait of a company's ideal customer by ...

Close