Browse Definitions :
81,546 results for:

How do I identify what data to replicate and what data to simply backup?

News | ComputerWeekly.com

It goes back again to the value of the data to your organization -- or the impact of losing access to this data. Typically, from a business ...

DHS puts Zitz in charge of cybersecurity division

News | ComputerWeekly.com

American career intelligence officer Robert S. Zitz has taken over day-to-day operations of the US National Cyber Security Division, but his ...

Downtime: Now here's an idea for all of you flag flyers...

News | ComputerWeekly.com

BlueCat appliance offers rock-solid security

News | ComputerWeekly.com

Hot Pick: The Adonis 1000 appliance bundles DNS and DHCP into an enterprise-class appliance for the centralized secure operation of network ...

Appro HyperBlade enhances datacentre experience

News | ComputerWeekly.com

Appro, a provider of enterprise computing systems, has launched a dual-core Intel Xeon processor-based HyperBlade server.

Lenovo goes for gold with SMBs

Feature | ComputerWeekly.com

When Shelley Rudman unexpectedly won a silver medal for her valiant efforts in the skeleton at this year’s Winter Olympics, the world knew she’d ...

Security Bytes: New flaw in Cisco IOS

News | ComputerWeekly.com

Security news including Cisco, Mozilla hires a former Microsoft strategist to bolster security, a new "pump-and-dump" stock spam campaign is ...

Litchfield: Database security is 'IT's biggest problem'

News | ComputerWeekly.com

At Black Hat USA 2006, database security guru David Litchfield unveils 20-plus IBM Informix flaws that attackers could exploit to create malicious ...

Three ways to create clustered storage, page 3

News | ComputerWeekly.com

Clustered storage systems run on storage servers, NAS gateways and hosts. Here's how to determine which clustered file-system architecture is best ...

Three ways to create clustered storage

News | ComputerWeekly.com

Clustered storage systems run on storage servers, NAS gateways and hosts. Here's how to determine which clustered file-system architecture is best ...

Possible Cisco zero-day exploit revealed at Black Hat

News | ComputerWeekly.com

Details of an alleged flaw related to SIP and PIX appliances, briefly mentioned in a Wednesday Black Hat presentation, are being kept under wraps as ...

SRM tools improve storage planning and deployment

News | ComputerWeekly.com

Why are storage administrators struggling to identify their storage resources and utilise those resources to their best potential?

UK IT leaders plan a night under the stars for charity

Feature | ComputerWeekly.com

About 250 senior IT professionals will take part in the annual Byte Night charity sleep-out on London’s Embankment on 22 September in an effort to ...

NetApp taps SAP for datacentre

News | ComputerWeekly.com

Network Appliance (NetApp) has added to its technology collaboration SAP offering SAP compliance and certification for its datacentre offerings.

Risk management references

Feature | ComputerWeekly.com

References for our Insider Risk Management Guide.

More from SearchSecurity -- July 2006

News | ComputerWeekly.com

Highlights from the July 2006 issue of Information Security magazine.

Blue Cross bears burden of 'no wireless' policy

News | ComputerWeekly.com

Blue Cross of Idaho had a "no wireless" policy on paper but never really enforced it. That is, until a team of auditors said the company had better ...

TelecityRedbus wins datacentre award

News | ComputerWeekly.com

Datacentre services provider TelecityRedbus has been selected by the renowned Stevie Awards in recognition of what has been described as outstanding ...

Networks news in brief

News | ComputerWeekly.com

Short takes from this week's network news

Outsourced way to hire contract staff

News | ComputerWeekly.com

IT services company FDM has launched a "straight through" recruitment service to help IT departments in the finance sector recruit contract staff.

XML Security Learning Guide

Feature | ComputerWeekly.com

Securing XML is an essential element in keeping Web services secure. This SearchSecurity.com Learning Guide is a compilation of resources that review...

Storage Word Search: Summer IT fun

Feature | ComputerWeekly.com

How about some summer storage fun? Try out SearchStorage.com's Word Search game. See if you can find the 15 terms listed.

What is the difference between RPO and RTO (from a backup perspective)?

News | ComputerWeekly.com

The recovery point objective (RPO) and the recovery time objective (RTO) are two very specific parameters that are closely associated with recovery. ...

What is the most important aspect of data protection when it comes to DR?

News | ComputerWeekly.com

You could answer that with one word really, and I would have to say "testing." Just "testing." Whatever you do when you're protecting data, whether ...

Weekly compilation of storage news

News | ComputerWeekly.com

Symantec peddles enterprise vault toolT and the new features developed because of a recent update to the US Federal Rules of Civil Procedure.

Xiotech resurfaces with data compliance focus

News | ComputerWeekly.com

Xiotech has been busy acquiring a legal discovery software vendor and building a data compliance practice, but what about storage?

SMB finds the perfect host

Feature | ComputerWeekly.com

When All3Media, a medium-sized TV programming producer, inherited an inflexible communications system, it turned to a more appealing, hosted ...

Netscape.com hit with cross-site scripting attack

News | ComputerWeekly.com

The popular Web portal was hit by a cross-site scripting attack early on 26 July but Netscape says the problem has been addressed

Security Bytes: Investigators slam VA over data breach

News | ComputerWeekly.com

Meanwhile: Cisco patches a router application flaw, a Washington law firm sues IBM over a server attack; and spammers sucker Web surfers with fake ...

Case study: A valuable solution

Feature | ComputerWeekly.com

A new telephony and call centre solution from Inter-Tel has transformed the way that e.surv Chartered Surveyors is able to work.

Strong authentication for businesses large and small

News | ComputerWeekly.com

Product review: Customer service could return calls more quickly when there's a problem. But overall, RSA SecurID Appliance 2.0 delivers robust, ...

Security Bytes: New Microsoft exploits in the wild

News | ComputerWeekly.com

The exploits target issues Microsoft patched earlier this month. Meanwhile, flaws are reported in Oracle for OpenView and a Mozilla Firefox keystroke...

Answers: Compliance All-in-One Guide quiz

News | ComputerWeekly.com

The key compliance questions unveiled

Security Bytes: ISS warns of new Microsoft Windows flaw

News | ComputerWeekly.com

Attackers could exploit the latest Microsoft Windows flaw to crash vulnerable machines and Symantec fixes a Brightmail AntiSpam flaw.

Application layer logging quiz answers

News | ComputerWeekly.com

The key questions revealed

Be careful you don't get more than you pay for with VoIP

Feature | ComputerWeekly.com

Implementing VoIP is attractive for all companies in particular SMBs. However, there are issues to address that may cost you more than what you save

Voicing concerns on Skype

Feature | ComputerWeekly.com

Skype has blazed a trail in the Voice over IP arena; its popularity hasn’t gone unnoticed by the hacker community however

Appro HyperBlade servers get performance recognition

News | ComputerWeekly.com

Appro, a provider of high-performance enterprise computing systems, has announced that Appro HyperBlade Clusters have been recognised as among the ...

Revamped Cisco WAFS worth the wait, users say

News | ComputerWeekly.com

Months late, Cisco has finally released a combined Wan optimisation and WAFS product, while startups like Riverbed have been snapping up the ...

New Microsoft Word zero-day exploit discovered

News | ComputerWeekly.com

Trojan.MDropper-Q is exploiting a vulnerability in Microsoft's word-processing application that could allow attackers to take control of certain ...

IT man on the 5am ferry as Horizon reaches Orkney

News | ComputerWeekly.com



James Rogers

Post Offices in two of the most isolated parts of the UK are the latest to go live as part of the Horizon ...

Proofpoint delivers strong messaging security

News | ComputerWeekly.com

Proofpoint Messaging Security Gateway is a highly recommended, affordable solution for big enterprises that need protection from email-based attacks.

Government blocks judicial review of Chinook disaster

News | ComputerWeekly.com

The Government has made it impossible for the families of two pilots blamed for the crash of Chinook helicopter ZD576 to seek a...

Jamie Gruener's position on API sharing

News | ComputerWeekly.com

Key questions on API sharing answered

Achieving the goal of CIO

Feature | ComputerWeekly.com

What exactly does a chief information officer do?Paul Burfitt, global CIO at AstraZeneca, analysed the various aspects of his job...

Best practices for enabling and maintaining compliance

News | ComputerWeekly.com

As part of our Storage Decisions conference preview series, Shaun Mahoney, senior storage engineer for Citigroup, Randy Wilson, assistant vice ...

MoD's Chinook tactics spark a constitutional row

News | ComputerWeekly.com

Chinook: The MoD's actions over the crash of Chinook ZD576 could have legal ramifications

Is the national programme for NHS IT set to be 'the biggest gamble in the world'?

Feature | ComputerWeekly.com

The private concerns of clinicians and IT professionals about the national programme are not being addressed, despite the front...

Peer urges Tony Blair to intervene over Chinook

News | ComputerWeekly.com

Lord Chalfont, the head of a Parliamentary campaign to clear the names of two pilots blamed for a Chinook helicopter crash in...

MPs from all parties unite in fight to clear Chinook pilots

News | ComputerWeekly.com

This week the Tories led an unprecedented all-party move to get the Government to clear the names of the pilots blamed for the...

New Mac OS X flaw exposed

News | ComputerWeekly.com

A Mac OS X flaw was exposed as part of the Month of Kernel Bugs. Also, a new Web site vows to follow the lead of researchers LMH and H.D. Moore with ...

Somerfield speeds up product development with online system

News | ComputerWeekly.com

Supermarket chain Somerfield will this week go live with the first stage of an initiative to computerise its new product...

FTC suggests search sites disclose deals

News | ComputerWeekly.com

The Federal Trade Commission (FTC) has suggested that search engine Web sites tell users when they are taking money from other...

EMC and HP allow mix and match storage

News | ComputerWeekly.com

Rivals EMC and Hewlett-Packard have agreed to expand a cross-licensing agreement for certain storage system application...

IT directors foresee technology revolution continuing in comms

Feature | ComputerWeekly.com

There are those who hold that the IT revolution has petered out with no more breakthroughs to come. But IT directors attending...

How to scour the world when outsourcing

Feature | ComputerWeekly.com



Thanks to Y2K compliance programmes, it is now perfectly acceptable for a firm to consider moving all or part of its systems ...

September 11: How Merrill Lynch recovered

News | ComputerWeekly.com

Merrill Lynch lost two data centres during the 11 September terrorist attacks in New York. The site is now functioning as a...

Symantec fixes NetBackup Puredisk flaw

News | ComputerWeekly.com

An unauthorised user could launch malicious code by exploiting a flaw in Symantec's Veritas NetBackup PureDisk product. But a fix is available.

Software Forensics: Chapter 2 -- The Players: Hackers, Crackers, Phreaks, and Other Doodz

News | ComputerWeekly.com

Read Chapter 2, Players: Hackers, Crackers, Phreaks, and Other Doodz, from the book "Software Forensics" written by Robert M. Slade.

Victory! Lords confirm CW stand - software flaw could have caused Chinook crash

News | ComputerWeekly.com

An historic House of Lords report has this week vindicated a five-year campaign by Computer Weekly for justice after the crash of...

Mozilla fixes several Firefox flaws

News | ComputerWeekly.com

Several flaws could be used for man-in-the-middle, spoofing and cross-site scripting attacks. Mozilla has released Firefox 1.5.0.7 to address the ...

Storage Decisions Session Downloads: Smart Shopper Track (LV 2006)

Feature | ComputerWeekly.com

Very few storage managers have carte blanche when it comes to storage spending. Sessions in our "Smart Shopper track" help managers get the most bang...

Exploiting Software: How to Break Code, Chapter 7 -- Buffer Overflow

News | ComputerWeekly.com

This excerpt is from Chapter 7, Buffer Overflow of Exploiting Software: How to Break Code written by Greg Hoglund and Gary McGraw.

School district expels outsourced backup, enrolls CDP

Feature | ComputerWeekly.com

Revere School District dumps tape and outsourced backup, and deploys SonicWall's continuous data protection product.

Messaging Security School

News | ComputerWeekly.com

SearchSecurity.com's Messaging Security School has brought together some of the most knowledgeable experts in the messaging security field to offer ...

Top network security tips of 2006

Feature | ComputerWeekly.com

The top Windows networking security tips of 2006 cover a range of topics, including network isolation, open source Windows security tools, VPN ...

Oracle fixes 101 flaws

News | ComputerWeekly.com

Attackers could exploit 45 of the 101 flaws remotely without a username or password. Meanwhile, the new CPU offers more detail on the number of flaws...

Resource guide to disk-based backup

News | ComputerWeekly.com

Alliance and Leicester to overhaul core systems

Feature | ComputerWeekly.com

Alliance & Leicester has announced plans replace many of its core banking systems with Accenture’s Alnova Financial Solutions banking platform under ...

Storage Decisions Session Downloads (NYC 2006)

Feature | ComputerWeekly.com

Take a look at the sessions that floored at the Storage Decisions conference in New York City, September 27-29, 2006.

How to manage encryption keys

News | ComputerWeekly.com

Encryption is an effective way to secure data, but the encryption keys used must be carefully managed to ensure data remains protected and accessible...

Top client security tips of 2006

Feature | ComputerWeekly.com

A network user without the proper know-how is a ticking time bomb when it comes to security. Check out our top five client hardening tips of 2006 to ...

Backup school: Quiz two, answer six

News | ComputerWeekly.com

Here is the answer to Backup school quiz two, question six.

Bacs launches online billing service

News | ComputerWeekly.com

UK clearing house Bacs has embarked on a joint venture with a US software company to provide an online bill presentation and...

MoD will defy Lords and MPs and stand by Chinook verdict

News | ComputerWeekly.com

The Ministry of Defence will defy two Parliamentary select committees next week by formally backing the verdict of negligence...

Nmap Technical Manual

Feature | ComputerWeekly.com

By now, most infosec pros have heard of Nmap, and most would agree that even though the popular freeware tool is invaluable, installing, configuring ...

NHS IT - A personal view

Opinion | ComputerWeekly.com

The media last week was full of comment on the "problems" at the NHS IT project as Accenture ducked out. Yet again, the comment portrayed the project...

Microsoft to fold security into Windows division

News | ComputerWeekly.com

The software giant said the move would make future Windows development efforts more efficient. The changes take effect after Microsoft releases Vista.

Microsoft to fix Visual Studio, Windows flaws

News | ComputerWeekly.com

Microsoft plans to release five security updates to address vulnerabilities in Windows and a flaw in Visual Studio as part of its monthly security ...

Zantaz buys data classification partner Singlecast

News | ComputerWeekly.com

Email archiving player Zantaz has purchased data classification startup Singlecast, which can categorise and apply policies to data before an email ...

Security Bytes: Hackers target the Terminator

News | ComputerWeekly.com

In other news, Symantec upgrades its Norton product line and the Anti-Phishing Working Group says phishing activity soared this summer.

Achieving compliance: a real-world roadmap

News | ComputerWeekly.com

A security manager's responsibilities extend beyond the technical aspects of the job. These days, effective governance and compliance are just as ...

Top tech tips from SearchStorage.com

News | ComputerWeekly.com

Check out the top tips on backup, SAN, NAS and storage management from SearchStorage.com.

MoD refuses to concede error in Chinook verdict

News | ComputerWeekly.com

The Ministry of Defence (MoD), citing a new series of simulations by Boeing, has refused to clear the names of two pilots blamed...

Instant messaging attacks rise in October

News | ComputerWeekly.com

In October alone, security firm Akonix Systems tracked 88 attacks that used instant messaging programs to spread. Attackers are also exploiting P2P ...

WEP: Wireless security's broken skeleton in the closet

News | ComputerWeekly.com

WEP for wireless security was cracked again recently. Though many will say WEP is obsolete, many companies still use it.

Securing VoIP Networks Chapter 7: Key Management Mechanisms

News | ComputerWeekly.com

Key management is a fundamental part of protecting Internet multimedia applications like VoIP, but the protocols can be difficult to design.

Recovering domain controllers after a server disk failure

Tip | ComputerWeekly.com

When recovering domain controllers after a system volume failure, normal restoration doesn't always work. Learn some special procedures in this tip.

Cracking the message in a bottle

News | ComputerWeekly.com

Between 2016 and 2019, a number of bottles washed ashore in Hamburg, each containing an ‘uncrackable’ message

Hero Honda upgrades SAP R3 to ECC6

News | ComputerWeekly.com

The SAP R3 to ECC6 upgrade came about because the auto company wanted to use SAP for IFRS implementation

Oracle CEO Larry Ellison debuts flagship analytics system of 'parallel architecture'

News | ComputerWeekly.com

Oracle CEO Larry Ellison has showcased an in-memory database engine for big data applications and a processor to rival IBM, combined in a strategy of...

Warwick University enters final phase of three-step IT transformation programme

News | ComputerWeekly.com

Warwick University has started the last phase of its three-year IT transformation, introducing small, user-driven IT projects to transform its IT ...

CW500: Andy Beale, technology director, Guardian News & Media

News | ComputerWeekly.com

In this CW500 Club video, Andy Beale talks to Computer Weekly editor in chief Bryan Glick to share his practical advice on how to move to the cloud.

GPU cracks six-character password in four seconds

News | ComputerWeekly.com

A £30 nVidia GeForce GT220 graphics card is capable of cracking strong passwords in a matter of hours.

Back-up datacentre challenge - to build or to host?

News | ComputerWeekly.com

The Royal College of General Practitioners has built its own back-up datacentre using a private cloud architecture, rather than use an external ...

Callcentre workers steal £400k from TUI Travel

News | ComputerWeekly.com

Four callcentre workers stole over £400,000 from their employer TUI Travel by paying customer refunds to themselves when processing claims.

HP completes £7.1bn Autonomy acquisition

News | ComputerWeekly.com

Hewlett-Packard (HP) has completed its acquisition of software company Autonomy for £7.1bn. HP said the acquisition positioned it as a leader in the ...

European Commission proposes €9.2bn investment for high-speed broadband

News | ComputerWeekly.com

As part of the proposals, the European Commission (EC) will outline targets to improve broadband speeds and prioritise rural areas.

CW500: Martin Taylor, head of infrastructure and service delivery, Mitchells & Butlers

News | ComputerWeekly.com

In this CW500 Club video, Martin Taylor talks to Computer Weekly editor in chief Bryan Glick to share his practical advice on how to move to the ...

What does Oracle's release of Fusion Applications mean for its customers?

News | ComputerWeekly.com

After what seemed an interminable development period, Oracle has finally released its Fusion Applications and a public cloud.

Networking
  • local area network (LAN)

    A local area network (LAN) is a group of computers and peripheral devices that are connected together within a distinct ...

  • TCP/IP

    TCP/IP stands for Transmission Control Protocol/Internet Protocol and is a suite of communication protocols used to interconnect ...

  • firewall as a service (FWaaS)

    Firewall as a service (FWaaS), also known as a cloud firewall, is a service that provides cloud-based network traffic analysis ...

Security
  • identity management (ID management)

    Identity management (ID management) is the organizational process for ensuring individuals have the appropriate access to ...

  • fraud detection

    Fraud detection is a set of activities undertaken to prevent money or property from being obtained through false pretenses.

  • single sign-on (SSO)

    Single sign-on (SSO) is a session and user authentication service that permits a user to use one set of login credentials -- for ...

CIO
  • IT budget

    IT budget is the amount of money spent on an organization's information technology systems and services. It includes compensation...

  • project scope

    Project scope is the part of project planning that involves determining and documenting a list of specific project goals, ...

  • core competencies

    For any organization, its core competencies refer to the capabilities, knowledge, skills and resources that constitute its '...

HRSoftware
  • recruitment management system (RMS)

    A recruitment management system (RMS) is a set of tools designed to manage the employee recruiting and hiring process. It might ...

  • core HR (core human resources)

    Core HR (core human resources) is an umbrella term that refers to the basic tasks and functions of an HR department as it manages...

  • HR service delivery

    HR service delivery is a term used to explain how an organization's human resources department offers services to and interacts ...

Customer Experience
  • martech (marketing technology)

    Martech (marketing technology) refers to the integration of software tools, platforms, and applications designed to streamline ...

  • transactional marketing

    Transactional marketing is a business strategy that focuses on single, point-of-sale transactions.

  • customer profiling

    Customer profiling is the detailed and systematic process of constructing a clear portrait of a company's ideal customer by ...

Close