Cisco boosts VoIP certification
News | ComputerWeekly.comThe upgraded CCNP midlevel Cisco certification now incorporates VoIP, security and wireless to boost converged network skills among enterprise ...
Security Blog Log: Israeli-Hezbollah war spills into cyberspace
News | ComputerWeekly.comThis week blogosphere warily watches online attacks inspired by the Mideast conflict and rants over the latest security incidents at AOL and the VA.
Mozilla issues critical security updates
News | ComputerWeekly.comNew patches to fix 13 software security flaws, eight of which have been deemed critical.
Microsoft patches seven July security holes, five critical
News | ComputerWeekly.comThe software giant's monthly batch of fixes includes critical repairs for Internet Explorer and Windows' networking features, plus "important" ...
Midsized firms reach out to backup service providers
News | ComputerWeekly.comData growth and ever-tightening compliance rules are among the factors driving some organizations to turn to service providers for help with backups.
AT&T breach affects 19,000 customers
News | ComputerWeekly.comOnline outlaws hacked into an AT&T computer system and stole credit card data on thousands of customers. AT&T has offered to pay for credit ...
Twelve Microsoft fixes coming on Patch Tuesday
News | ComputerWeekly.comMicrosoft Tuesday will release a dozen new security bulletins for its Windows and Office products, likely including fixes for several outstanding ...
Should I back up the operating system files?
News | ComputerWeekly.comWe hear a lot about single-instance storage; single-instance backup. When you start backing up operating system files, you will have the same .DLL, ...
Security Bytes: CA fixes eTrust Antivirus flaws
News | ComputerWeekly.comOnline thieves steal $700,000 from personal accounts, researchers expose e-passport vulnerability; and arrests are made in the VA security breach ...
Three ways to create clustered storage, page 2
News | ComputerWeekly.comClustered storage systems run on storage servers, NAS gateways and hosts. Here's how to determine which clustered file-system architecture is best ...
Critical flaws found in Excel, Flash Player
News | ComputerWeekly.comFrSIRT says holes in Microsoft's spreadsheet program and Adobe's media player could allow attackers to take control of affected machines and initiate...
CSI survey: Data breaches still being swept under the rug
News | ComputerWeekly.comThe annual CSI/FBI Computer Crime and Security Survey shows companies are reporting fewer financial losses from data breaches. That doesn't mean the ...
Flaw found in Firefox 2.0
News | ComputerWeekly.comAttackers could exploit the security flaw to crash versions 1.5.0.7 and 2.0 of the browser, according to various security advisories.
TNT to provide staff with e-mail smartphones rather than laptops
News | ComputerWeekly.comLogistics company TNT is to provide up to 700 staff worldwide with mobile e-mail, using the Nokia Communicator 9500 smartphone as...
Business continuity: Keep on running
Feature | ComputerWeekly.comToo many plans for business continuity do not reflect the true risks. Sally Flood looks at risk assessment and the creation a realistic strategy.
Pre-CISSP: Options for the security newbie
News | ComputerWeekly.comShon Harris advises novice security practitioners on the value of entry-level certifications -- and good, old-fashioned experience -- in preparation ...
Shifting services back indoors
News | ComputerWeekly.comAlmost a quarter of blue chip firms in the UK are so disillusioned with outsourcing they are hauling their services back in-house.
Sleep out to help homeless children
News | ComputerWeekly.comThe annual Byte Night charity sleep-out will take place on 22 September at London’s Victoria Tower Gardens on the Embankment next to the House of ...
Inside MSRC: Debunking Excel exploits
Feature | ComputerWeekly.comMicrosoft's Christopher Budd puts the magnifying glass to Microsoft's July bulletinsand says one alleged Excel exploit isn't what it seems.
An era ends as Tandberg buys Exabyte
News | ComputerWeekly.comThe once-dominant player in the tape market has ended a long downward spiral by selling off its assets. At least customers can now count on continued...
Ajax threats worry researchers
News | ComputerWeekly.comBlack Hat: While it makes smooth Web applications like Google Maps possible, the rush to adopt Ajax may fuel haphazard development and a feeding ...
AOL data spill leads to dismissals, resignation
News | ComputerWeekly.comAOL has fired two employees and its CTO has left the company after search data from 658,000 customers was accidentally exposed earlier this month.
Arun Taneja: Blogs and more
News | ComputerWeekly.comMonthly blogs by Arun Taneja, as well as other material by this storage expert.
Vendors reject preferential knowledge sharing
News | ComputerWeekly.comWhile Cisco continues to investigate a potential PIX firewall flaw, it and other vendors say sharing security information quickly and ...
Virtualisation eases patch management pain
News | ComputerWeekly.comIT managers are learning that using desktop virtualisation software to patch their enterprise desktops has the potential to save time, money and ...
VoIP call quality on the decline
News | ComputerWeekly.comAdvances in technology have made VoIP more common, but that hasn't stopped VoIP call quality from dropping steadily over the last 18 months, ...
Twin Trojans use PowerPoint to spread
News | ComputerWeekly.comResearchers aren't yet sure if troublesome new Trojan horse programs are exploiting a new PowerPoint flaw or the vulnerabilities Microsoft patched ...
Third-party patching: Prudent or perilous?
News | ComputerWeekly.comSecurity patches issued by third parties have become more prevalent in recent months, and while some security pros endorse them, others say they're ...
Vista kernel limits have security vendors on edge
News | ComputerWeekly.comMicrosoft's PatchGuard feature will prevent extension of Windows Vista kernel, and antivirus vendors say it'll make it harder for them to produce ...
IBM spruces up storage line
News | ComputerWeekly.comIBM floated a raft of announcements across its storage line, but analysts say they are still waiting for the updates stuck in the research phase.
IT bosses preparing for Byte Night
Feature | ComputerWeekly.comAbout 250 senior IT professionals will take part in the annual Byte Night charity sleep-out on London’s Embankment on 22 September in an effort to ...
Cheat sheet: Access management solutions and their pros and cons
News | ComputerWeekly.comPopular authentication methods such as passwords, biometrics and two-factor are assessed in this chart.
Cisco struggles with SIP firewall flaw
News | ComputerWeekly.comCisco admits it can't reproduce a SIP security flaw in its PIX firewall that was first identified by a researcher at Black Hat.
EMC updates SAN Advisor design tool
News | ComputerWeekly.comEMC's SAN design tool now recognises zones and allows users to customise rules; HP and EMC sign five-year cross-licensing deal.
Emulex acquisition could cloud future of FC-SATA spec
News | ComputerWeekly.comNew Emulex subsidiary Sierra Logic's strength is in FC-SATA bridging technology. Meanwhile, ONStor launches midrange clustered NAS, and Quantum ...
FullArmor lives up to its name
News | ComputerWeekly.comPolicyPortal provides an Internet interface to easily configure, monitor and enforce near real-time Active Directory-based policy compliance through ...
Data Connections launches security for datacentre product line
News | ComputerWeekly.comData Connections, a provider of complete datacentre solutions, has launched - in partnership with NetClarity - RockSolid, a program designed to ...
Cost of Libra magistrates system trebles
News | ComputerWeekly.comThe Department of Constitutional Affairs has admitted that the cost of the Libra case management system for magistrates courts will rise to £487m – ...
EMC sheds light on RSA integration plans
News | ComputerWeekly.comAs the dust begins to settle on EMC's $2.1 billion acquisition of RSA Security, the hard work of integration begins. What's EMC strategy here?
Endpoint security quiz answers
Feature | ComputerWeekly.comThe answers to the Endpoint quiz
Business continuity keeps companies running
Feature | ComputerWeekly.comAs we speak, it appears that disruption to IT services by the London bombings was minimised due to effective and realistic business continuity ...
A new era of computer worms: Wireless mobile worms
News | ComputerWeekly.comIn this excerpt of Chapter 9 from "The Art of Computer Virus Research and Defense," author Peter Szor dissects the Cabir worm.
Quiz: Identify and analyze Web server attacks
News | ComputerWeekly.comTest your knowledge of the material covered in the "Identify and analyze Web server attacks" section of Intrusion Defense School.
Quiz: Identify and analyze Web server attacks, answer No. 2
News | ComputerWeekly.comQuiz: Identify and analyze Web server attacks, answer No. 2
Quiz: Secure Web directories and development, answer No. 5
News | ComputerWeekly.comQuiz: Secure Web directories and development, answer No. 5
Quiz: Identify and analyze Web server attacks, answer No. 3
News | ComputerWeekly.comQuiz: Identify and analyze Web server attacks, answer No. 3
Quiz: Secure Web directories and development, answer No. 1
News | ComputerWeekly.comQuiz: Secure Web directories and development, answer No. 1
Quiz: Secure Web directories and development, answer No. 2
News | ComputerWeekly.comQuiz: Secure Web directories and development, answer No. 2
Atos wins DWP deal extension
News | ComputerWeekly.comThe Department for Work and Pensions has renewed a contract with IT services company Atos Origin to deliver medical advice and...
Tight contract management vital, users told at SSRG debut
News | ComputerWeekly.comThe Strategic Supplier Relationships Group, which brings together 10 of the UK's most influential IT user groups, was formally...
Combining technology and social engineering: Hacking behind bars
News | ComputerWeekly.comIn this excerpt from Chapter 11 of "The Art of Deception: Controlling the Human Element of Security," authors Kevin Mitnick and William L. Simon ...
Sarbox draining corporate security budgets
News | ComputerWeekly.comCorporate investment to comply with the Sarbanes-Oxley data security legislation has come at the expense of dealing with other security threats, ...
Pop quiz: E-mail security
News | ComputerWeekly.comFind out how much you know about securing your organization's e-mail.
Sarbox challenge drains security budgets
News | ComputerWeekly.comInternational corporate spending on compliance with the Sarbanes-Oxley data security legislation has come at the expense of dealing with other ...
ControlGuard targets rogue devices
News | ComputerWeekly.comControlGuard Access Manager is an effective tool for controlling what devices users can add to their workstations and how they are used.
Fast Guide: VoIP encryption
News | ComputerWeekly.comA guide to encryption within VoIP networks
Dell and EMC: Five more years
News | ComputerWeekly.comDell leans on EMC for support in the face of an SEC investigation and possible delisting from NASDAQ.
Dundee to teach ethical hacking BSc
News | ComputerWeekly.comA degree in ethical hacking will be on offer at a Scottish university from the new academic year.
Automated provisioning quiz
News | ComputerWeekly.comTake this five-question quiz to see how much you've learned about automated provisioning.
How do I establish recovery priority for my applications?
News | ComputerWeekly.comIf it's at the IT level, it comes from a data perspective. When you start moving up a little bit into the business side, people start looking at the ...
Looking ahead to life without passwords
News | ComputerWeekly.comSecurity pros know that passwords are nothing but trouble. For them, single-sign on, two-factor authentication and federated ID represent the path to...
VPNs and remote access quiz
News | ComputerWeekly.comTake this five-question quiz to see how much you've learned about VPNs and remote access.
Longhorn on the road to Linux compatibility
News | ComputerWeekly.comThe next version of Windows Server – codenamed Longhorn – will include virtualisation technology that is interoperable with the open source Linux ...
Apple fixes Xsan security flaw
News | ComputerWeekly.comAttackers could exploit a security flaw in Apple's Xsan file system to launch malicious code and crash vulnerable machines, but a fix is available.
3PAR adds midrange array for secondary sites
News | ComputerWeekly.com3PAR has introduced a smaller version of its InServ Storage Server, which it describes as a product-line extension into its existing customer base.
Users cautious about Brocade-McData merger
News | ComputerWeekly.comCustomers are worried about McData switches interoperating with other products and how Brocade will handle product overlap.
Bosses welcome security warnings from outsiders
Feature | ComputerWeekly.comSecurity Bytes: Exploits targeting freshly patched Apple flaw
News | ComputerWeekly.comApple patches nearly two dozen holes in OS X, but not before exploits are unleashed. Plus McAfee fixes a critical flaw and EMC gets the OK to buy RSA.
Survey: Data breaches difficult to spot, prevent
News | ComputerWeekly.comIT pros worry that false positives and a lack of resources are preventing them from blocking data breaches
Symantec CIO vies with virtualization, device policy
News | ComputerWeekly.comSymantec CIO David Thompson says virtualization is a big part of the security giant's future and it has developed a policy to mitigate virtualization...
Symantec fixes Backup Exec flaw
News | ComputerWeekly.comAttackers could exploit flaws in Symantec Backup Exec 9.1 and 9.2 for NetWare Servers to cause a denial of service, launch malicious code and gain ...
Security Blog Log: Opinions abound on IBM/ISS deal
News | ComputerWeekly.comBloggers ponder what IBM's acquisition of ISS says about the industry as a whole. Is the end in sight for independent security vendors?
IXEurope heads trial of increased security between datacentres
News | ComputerWeekly.comIXEurope, one of Europe’s fastest growing datacentre services companies, and idQuantique, a quantum cryptography company, have agreed to set up a ...
Automated provisioning quiz answers
Feature | ComputerWeekly.comthe key questions answered
Secure network perimeter to result from Symantec-Juniper deal
News | ComputerWeekly.comJuniper and Symantec announced a deal to integrate Symantec's client security software with Juniper's security hardware. The result will allow ...
Answers: VPN and remote access know-how quiz
News | ComputerWeekly.comthe crucial questions answered
VoIP still a confusing area for SMBs
News | ComputerWeekly.comA study released at today's VON conference in Boston suggests that SMBs -- despite their growing use of VoIP -- are still confused about VoIP ...
VoIP startup untethers would-be mobile workers from wireline office phones
News | ComputerWeekly.comVoIP startup DiVitas Networks has voice-over-WiFi-to-cellular technology in the works that gives endusers access to enterprise apps and puts ...
Endpoint security quiz
Feature | ComputerWeekly.comTake this five-question quiz to see how much you've learned about endpoint security.
Information Security Decisions Session Downloads
News | ComputerWeekly.comSession Downloads from Information Security Decisions 2006 Conference.
Mobile security begins with policy
News | ComputerWeekly.comMobile security can no longer be an afterthought. Mobile experts say security starts, but doesn't end, with policy.
Mocbot update targets MS06-040 flaw
News | ComputerWeekly.comSecurity experts raised the red flag Sunday as new malware targets the Windows flaw addressed in the MS06-040 patch. Attackers are using the flaw to ...
RFID security issues are cause for corporate concern
News | ComputerWeekly.comAlthough small in nature, RFID tags could be used to attack databases and corrupt critical information. It's a growing concern as corporate RFID use ...
Riverbed update offers users more bandwidth, better reporting
News | ComputerWeekly.comRiverbed announced a package of hardware and software updates, which some customers say they've been waiting for.
Risk management: Data organization and impact analysis
Feature | ComputerWeekly.comThis first article of the Insider Risk Management Guide explains how to data organization is the first step in implementing insider threat controls.
Security Bytes: Data breach affects 100,000 military personnel
News | ComputerWeekly.comMeanwhile: Phishers use a phone trick to dupe PayPal users; the PCI security standard will get more teeth and a survey illustrates an increase in ...
Risk management: Implementation of baseline controls
Feature | ComputerWeekly.comThis fourth article in the Insider Risk Management Guide examines the implementation of baseline controls.
Questions that need to be answered on NHS IT plan
Feature | ComputerWeekly.comFour years ago the government announced to a grateful NHS a national IT programme that would become the world's largest civil computer scheme.
Not just a big switch
News | ComputerWeekly.comFibre Channel directors don't just provide lots of ports, they also offer ways to connect disparate SANs, isolate data and devices within a fabric, ...
Industry chiefs to declare war on for-profit cyber criminals
Feature | ComputerWeekly.comIT industry leaders reaffirm the importance of security to a digital economy beset by money-driven cyber criminals.
MEF drives up quality standards in carrier Ethernet
News | ComputerWeekly.comThe Metro Ethernet Forum (MEF) has expanded its certification program to include quality of service parameters in network kit, to ensure service ...
Data storage compliance's impact on storage product choices
News | ComputerWeekly.comData storage compliance is having a tremendous impact on the storage organization, as well as the management practices employed to retain, search, ...
Silver Peak expands datacentre disaster recovery
News | ComputerWeekly.comSilver Peak Systems, a provider of network acceleration solutions, has unveiled its NX-5500 network acceleration appliance.
Risk management: Baseline management and control
Feature | ComputerWeekly.comIdentifying baseline controls is the second step to implementing insider threat controls as described in this article from SearchSecurity's Insider ...
Qualcomm to halve storage growth in 2007
News | ComputerWeekly.comWireless chipmaker Qualcomm expects to slow down its storage growth by at least 50% next year using a capacity utilisation tool from MonoSphere.
Preparing for 'little disasters' often neglected
News | ComputerWeekly.comTom Dugan, CTO of Recovery Networks, says it's common for users to prepare to lose an entire building -- but aren't ready for small-scale losses &...
Skills fears as number of IT students plummets
News | ComputerWeekly.comMicrosoft offers SMBs all-in-one security and protection
News | ComputerWeekly.comSmall- to medium-sized businesses (SMBs) are among the key targets of Microsoft's latest solution, Windows Live OneCare.
Blade servers stand out in sluggish server arena
News | ComputerWeekly.comA survey by IDC has shown that blade servers were among few highlights in a generally sluggish worldwide server market in the first quarter of 2006.
Employee monitoring should be done with care
News | ComputerWeekly.comEmployee monitoring is on the rise as firms try to safeguard their sensitive information and increase productivity.