How do I identify what data to replicate and what data to simply backup?
News | ComputerWeekly.comIt goes back again to the value of the data to your organization -- or the impact of losing access to this data. Typically, from a business ...
DHS puts Zitz in charge of cybersecurity division
News | ComputerWeekly.comAmerican career intelligence officer Robert S. Zitz has taken over day-to-day operations of the US National Cyber Security Division, but his ...
Downtime: Now here's an idea for all of you flag flyers...
News | ComputerWeekly.comBlueCat appliance offers rock-solid security
News | ComputerWeekly.comHot Pick: The Adonis 1000 appliance bundles DNS and DHCP into an enterprise-class appliance for the centralized secure operation of network ...
Appro HyperBlade enhances datacentre experience
News | ComputerWeekly.comAppro, a provider of enterprise computing systems, has launched a dual-core Intel Xeon processor-based HyperBlade server.
Lenovo goes for gold with SMBs
Feature | ComputerWeekly.comWhen Shelley Rudman unexpectedly won a silver medal for her valiant efforts in the skeleton at this year’s Winter Olympics, the world knew she’d ...
Security Bytes: New flaw in Cisco IOS
News | ComputerWeekly.comSecurity news including Cisco, Mozilla hires a former Microsoft strategist to bolster security, a new "pump-and-dump" stock spam campaign is ...
Litchfield: Database security is 'IT's biggest problem'
News | ComputerWeekly.comAt Black Hat USA 2006, database security guru David Litchfield unveils 20-plus IBM Informix flaws that attackers could exploit to create malicious ...
Three ways to create clustered storage, page 3
News | ComputerWeekly.comClustered storage systems run on storage servers, NAS gateways and hosts. Here's how to determine which clustered file-system architecture is best ...
Three ways to create clustered storage
News | ComputerWeekly.comClustered storage systems run on storage servers, NAS gateways and hosts. Here's how to determine which clustered file-system architecture is best ...
Possible Cisco zero-day exploit revealed at Black Hat
News | ComputerWeekly.comDetails of an alleged flaw related to SIP and PIX appliances, briefly mentioned in a Wednesday Black Hat presentation, are being kept under wraps as ...
SRM tools improve storage planning and deployment
News | ComputerWeekly.comWhy are storage administrators struggling to identify their storage resources and utilise those resources to their best potential?
UK IT leaders plan a night under the stars for charity
Feature | ComputerWeekly.comAbout 250 senior IT professionals will take part in the annual Byte Night charity sleep-out on London’s Embankment on 22 September in an effort to ...
NetApp taps SAP for datacentre
News | ComputerWeekly.comNetwork Appliance (NetApp) has added to its technology collaboration SAP offering SAP compliance and certification for its datacentre offerings.
Risk management references
Feature | ComputerWeekly.comReferences for our Insider Risk Management Guide.
More from SearchSecurity -- July 2006
News | ComputerWeekly.comHighlights from the July 2006 issue of Information Security magazine.
Blue Cross bears burden of 'no wireless' policy
News | ComputerWeekly.comBlue Cross of Idaho had a "no wireless" policy on paper but never really enforced it. That is, until a team of auditors said the company had better ...
TelecityRedbus wins datacentre award
News | ComputerWeekly.comDatacentre services provider TelecityRedbus has been selected by the renowned Stevie Awards in recognition of what has been described as outstanding ...
Networks news in brief
News | ComputerWeekly.comShort takes from this week's network news
Outsourced way to hire contract staff
News | ComputerWeekly.comIT services company FDM has launched a "straight through" recruitment service to help IT departments in the finance sector recruit contract staff.
XML Security Learning Guide
Feature | ComputerWeekly.comSecuring XML is an essential element in keeping Web services secure. This SearchSecurity.com Learning Guide is a compilation of resources that review...
Storage Word Search: Summer IT fun
Feature | ComputerWeekly.comHow about some summer storage fun? Try out SearchStorage.com's Word Search game. See if you can find the 15 terms listed.
What is the difference between RPO and RTO (from a backup perspective)?
News | ComputerWeekly.comThe recovery point objective (RPO) and the recovery time objective (RTO) are two very specific parameters that are closely associated with recovery. ...
What is the most important aspect of data protection when it comes to DR?
News | ComputerWeekly.comYou could answer that with one word really, and I would have to say "testing." Just "testing." Whatever you do when you're protecting data, whether ...
Weekly compilation of storage news
News | ComputerWeekly.comSymantec peddles enterprise vault toolT and the new features developed because of a recent update to the US Federal Rules of Civil Procedure.
Xiotech resurfaces with data compliance focus
News | ComputerWeekly.comXiotech has been busy acquiring a legal discovery software vendor and building a data compliance practice, but what about storage?
SMB finds the perfect host
Feature | ComputerWeekly.comWhen All3Media, a medium-sized TV programming producer, inherited an inflexible communications system, it turned to a more appealing, hosted ...
Netscape.com hit with cross-site scripting attack
News | ComputerWeekly.comThe popular Web portal was hit by a cross-site scripting attack early on 26 July but Netscape says the problem has been addressed
Security Bytes: Investigators slam VA over data breach
News | ComputerWeekly.comMeanwhile: Cisco patches a router application flaw, a Washington law firm sues IBM over a server attack; and spammers sucker Web surfers with fake ...
Case study: A valuable solution
Feature | ComputerWeekly.comA new telephony and call centre solution from Inter-Tel has transformed the way that e.surv Chartered Surveyors is able to work.
Strong authentication for businesses large and small
News | ComputerWeekly.comProduct review: Customer service could return calls more quickly when there's a problem. But overall, RSA SecurID Appliance 2.0 delivers robust, ...
Security Bytes: New Microsoft exploits in the wild
News | ComputerWeekly.comThe exploits target issues Microsoft patched earlier this month. Meanwhile, flaws are reported in Oracle for OpenView and a Mozilla Firefox keystroke...
Answers: Compliance All-in-One Guide quiz
News | ComputerWeekly.comThe key compliance questions unveiled
Security Bytes: ISS warns of new Microsoft Windows flaw
News | ComputerWeekly.comAttackers could exploit the latest Microsoft Windows flaw to crash vulnerable machines and Symantec fixes a Brightmail AntiSpam flaw.
Application layer logging quiz answers
News | ComputerWeekly.comThe key questions revealed
Be careful you don't get more than you pay for with VoIP
Feature | ComputerWeekly.comImplementing VoIP is attractive for all companies in particular SMBs. However, there are issues to address that may cost you more than what you save
Voicing concerns on Skype
Feature | ComputerWeekly.comSkype has blazed a trail in the Voice over IP arena; its popularity hasn’t gone unnoticed by the hacker community however
Appro HyperBlade servers get performance recognition
News | ComputerWeekly.comAppro, a provider of high-performance enterprise computing systems, has announced that Appro HyperBlade Clusters have been recognised as among the ...
Revamped Cisco WAFS worth the wait, users say
News | ComputerWeekly.comMonths late, Cisco has finally released a combined Wan optimisation and WAFS product, while startups like Riverbed have been snapping up the ...
New Microsoft Word zero-day exploit discovered
News | ComputerWeekly.comTrojan.MDropper-Q is exploiting a vulnerability in Microsoft's word-processing application that could allow attackers to take control of certain ...
IT man on the 5am ferry as Horizon reaches Orkney
News | ComputerWeekly.com
James Rogers
Post Offices in two of the most isolated parts of the UK are the latest to go live as part of the Horizon ...
Proofpoint delivers strong messaging security
News | ComputerWeekly.comProofpoint Messaging Security Gateway is a highly recommended, affordable solution for big enterprises that need protection from email-based attacks.
Government blocks judicial review of Chinook disaster
News | ComputerWeekly.comThe Government has made it impossible for the families of two pilots blamed for the crash of Chinook helicopter ZD576 to seek a...
Jamie Gruener's position on API sharing
News | ComputerWeekly.comKey questions on API sharing answered
Achieving the goal of CIO
Feature | ComputerWeekly.comWhat exactly does a chief information officer do?Paul Burfitt, global CIO at AstraZeneca, analysed the various aspects of his job...
Best practices for enabling and maintaining compliance
News | ComputerWeekly.comAs part of our Storage Decisions conference preview series, Shaun Mahoney, senior storage engineer for Citigroup, Randy Wilson, assistant vice ...
MoD's Chinook tactics spark a constitutional row
News | ComputerWeekly.comChinook: The MoD's actions over the crash of Chinook ZD576 could have legal ramifications
Is the national programme for NHS IT set to be 'the biggest gamble in the world'?
Feature | ComputerWeekly.comThe private concerns of clinicians and IT professionals about the national programme are not being addressed, despite the front...
Peer urges Tony Blair to intervene over Chinook
News | ComputerWeekly.comLord Chalfont, the head of a Parliamentary campaign to clear the names of two pilots blamed for a Chinook helicopter crash in...
MPs from all parties unite in fight to clear Chinook pilots
News | ComputerWeekly.comThis week the Tories led an unprecedented all-party move to get the Government to clear the names of the pilots blamed for the...
New Mac OS X flaw exposed
News | ComputerWeekly.comA Mac OS X flaw was exposed as part of the Month of Kernel Bugs. Also, a new Web site vows to follow the lead of researchers LMH and H.D. Moore with ...
Somerfield speeds up product development with online system
News | ComputerWeekly.comSupermarket chain Somerfield will this week go live with the first stage of an initiative to computerise its new product...
FTC suggests search sites disclose deals
News | ComputerWeekly.comThe Federal Trade Commission (FTC) has suggested that search engine Web sites tell users when they are taking money from other...
EMC and HP allow mix and match storage
News | ComputerWeekly.comRivals EMC and Hewlett-Packard have agreed to expand a cross-licensing agreement for certain storage system application...
IT directors foresee technology revolution continuing in comms
Feature | ComputerWeekly.comThere are those who hold that the IT revolution has petered out with no more breakthroughs to come. But IT directors attending...
How to scour the world when outsourcing
Feature | ComputerWeekly.com
Thanks to Y2K compliance programmes, it is now perfectly acceptable for a firm to consider moving all or part of its systems ...
September 11: How Merrill Lynch recovered
News | ComputerWeekly.comMerrill Lynch lost two data centres during the 11 September terrorist attacks in New York. The site is now functioning as a...
Symantec fixes NetBackup Puredisk flaw
News | ComputerWeekly.comAn unauthorised user could launch malicious code by exploiting a flaw in Symantec's Veritas NetBackup PureDisk product. But a fix is available.
Software Forensics: Chapter 2 -- The Players: Hackers, Crackers, Phreaks, and Other Doodz
News | ComputerWeekly.comRead Chapter 2, Players: Hackers, Crackers, Phreaks, and Other Doodz, from the book "Software Forensics" written by Robert M. Slade.
Victory! Lords confirm CW stand - software flaw could have caused Chinook crash
News | ComputerWeekly.comAn historic House of Lords report has this week vindicated a five-year campaign by Computer Weekly for justice after the crash of...
Mozilla fixes several Firefox flaws
News | ComputerWeekly.comSeveral flaws could be used for man-in-the-middle, spoofing and cross-site scripting attacks. Mozilla has released Firefox 1.5.0.7 to address the ...
Storage Decisions Session Downloads: Smart Shopper Track (LV 2006)
Feature | ComputerWeekly.comVery few storage managers have carte blanche when it comes to storage spending. Sessions in our "Smart Shopper track" help managers get the most bang...
Exploiting Software: How to Break Code, Chapter 7 -- Buffer Overflow
News | ComputerWeekly.comThis excerpt is from Chapter 7, Buffer Overflow of Exploiting Software: How to Break Code written by Greg Hoglund and Gary McGraw.
School district expels outsourced backup, enrolls CDP
Feature | ComputerWeekly.comRevere School District dumps tape and outsourced backup, and deploys SonicWall's continuous data protection product.
Messaging Security School
News | ComputerWeekly.comSearchSecurity.com's Messaging Security School has brought together some of the most knowledgeable experts in the messaging security field to offer ...
Top network security tips of 2006
Feature | ComputerWeekly.comThe top Windows networking security tips of 2006 cover a range of topics, including network isolation, open source Windows security tools, VPN ...
Oracle fixes 101 flaws
News | ComputerWeekly.comAttackers could exploit 45 of the 101 flaws remotely without a username or password. Meanwhile, the new CPU offers more detail on the number of flaws...
Resource guide to disk-based backup
News | ComputerWeekly.comAlliance and Leicester to overhaul core systems
Feature | ComputerWeekly.comAlliance & Leicester has announced plans replace many of its core banking systems with Accenture’s Alnova Financial Solutions banking platform under ...
Storage Decisions Session Downloads (NYC 2006)
Feature | ComputerWeekly.comTake a look at the sessions that floored at the Storage Decisions conference in New York City, September 27-29, 2006.
How to manage encryption keys
News | ComputerWeekly.comEncryption is an effective way to secure data, but the encryption keys used must be carefully managed to ensure data remains protected and accessible...
Top client security tips of 2006
Feature | ComputerWeekly.comA network user without the proper know-how is a ticking time bomb when it comes to security. Check out our top five client hardening tips of 2006 to ...
Backup school: Quiz two, answer six
News | ComputerWeekly.comHere is the answer to Backup school quiz two, question six.
Bacs launches online billing service
News | ComputerWeekly.comUK clearing house Bacs has embarked on a joint venture with a US software company to provide an online bill presentation and...
MoD will defy Lords and MPs and stand by Chinook verdict
News | ComputerWeekly.comThe Ministry of Defence will defy two Parliamentary select committees next week by formally backing the verdict of negligence...
Nmap Technical Manual
Feature | ComputerWeekly.comBy now, most infosec pros have heard of Nmap, and most would agree that even though the popular freeware tool is invaluable, installing, configuring ...
NHS IT - A personal view
Opinion | ComputerWeekly.comThe media last week was full of comment on the "problems" at the NHS IT project as Accenture ducked out. Yet again, the comment portrayed the project...
Microsoft to fold security into Windows division
News | ComputerWeekly.comThe software giant said the move would make future Windows development efforts more efficient. The changes take effect after Microsoft releases Vista.
Microsoft to fix Visual Studio, Windows flaws
News | ComputerWeekly.comMicrosoft plans to release five security updates to address vulnerabilities in Windows and a flaw in Visual Studio as part of its monthly security ...
Zantaz buys data classification partner Singlecast
News | ComputerWeekly.comEmail archiving player Zantaz has purchased data classification startup Singlecast, which can categorise and apply policies to data before an email ...
Security Bytes: Hackers target the Terminator
News | ComputerWeekly.comIn other news, Symantec upgrades its Norton product line and the Anti-Phishing Working Group says phishing activity soared this summer.
Achieving compliance: a real-world roadmap
News | ComputerWeekly.comA security manager's responsibilities extend beyond the technical aspects of the job. These days, effective governance and compliance are just as ...
Top tech tips from SearchStorage.com
News | ComputerWeekly.comCheck out the top tips on backup, SAN, NAS and storage management from SearchStorage.com.
MoD refuses to concede error in Chinook verdict
News | ComputerWeekly.comThe Ministry of Defence (MoD), citing a new series of simulations by Boeing, has refused to clear the names of two pilots blamed...
Instant messaging attacks rise in October
News | ComputerWeekly.comIn October alone, security firm Akonix Systems tracked 88 attacks that used instant messaging programs to spread. Attackers are also exploiting P2P ...
WEP: Wireless security's broken skeleton in the closet
News | ComputerWeekly.comWEP for wireless security was cracked again recently. Though many will say WEP is obsolete, many companies still use it.
Securing VoIP Networks Chapter 7: Key Management Mechanisms
News | ComputerWeekly.comKey management is a fundamental part of protecting Internet multimedia applications like VoIP, but the protocols can be difficult to design.
Recovering domain controllers after a server disk failure
Tip | ComputerWeekly.comWhen recovering domain controllers after a system volume failure, normal restoration doesn't always work. Learn some special procedures in this tip.
Cracking the message in a bottle
News | ComputerWeekly.comBetween 2016 and 2019, a number of bottles washed ashore in Hamburg, each containing an ‘uncrackable’ message
Hero Honda upgrades SAP R3 to ECC6
News | ComputerWeekly.comThe SAP R3 to ECC6 upgrade came about because the auto company wanted to use SAP for IFRS implementation
Oracle CEO Larry Ellison debuts flagship analytics system of 'parallel architecture'
News | ComputerWeekly.comOracle CEO Larry Ellison has showcased an in-memory database engine for big data applications and a processor to rival IBM, combined in a strategy of...
Warwick University enters final phase of three-step IT transformation programme
News | ComputerWeekly.comWarwick University has started the last phase of its three-year IT transformation, introducing small, user-driven IT projects to transform its IT ...
CW500: Andy Beale, technology director, Guardian News & Media
News | ComputerWeekly.comIn this CW500 Club video, Andy Beale talks to Computer Weekly editor in chief Bryan Glick to share his practical advice on how to move to the cloud.
GPU cracks six-character password in four seconds
News | ComputerWeekly.comA £30 nVidia GeForce GT220 graphics card is capable of cracking strong passwords in a matter of hours.
Back-up datacentre challenge - to build or to host?
News | ComputerWeekly.comThe Royal College of General Practitioners has built its own back-up datacentre using a private cloud architecture, rather than use an external ...
Callcentre workers steal £400k from TUI Travel
News | ComputerWeekly.comFour callcentre workers stole over £400,000 from their employer TUI Travel by paying customer refunds to themselves when processing claims.
HP completes £7.1bn Autonomy acquisition
News | ComputerWeekly.comHewlett-Packard (HP) has completed its acquisition of software company Autonomy for £7.1bn. HP said the acquisition positioned it as a leader in the ...
European Commission proposes €9.2bn investment for high-speed broadband
News | ComputerWeekly.comAs part of the proposals, the European Commission (EC) will outline targets to improve broadband speeds and prioritise rural areas.
CW500: Martin Taylor, head of infrastructure and service delivery, Mitchells & Butlers
News | ComputerWeekly.comIn this CW500 Club video, Martin Taylor talks to Computer Weekly editor in chief Bryan Glick to share his practical advice on how to move to the ...
What does Oracle's release of Fusion Applications mean for its customers?
News | ComputerWeekly.comAfter what seemed an interminable development period, Oracle has finally released its Fusion Applications and a public cloud.