In Depth
In Depth
-
What storage managers are buying and why, page 5
What storage managers are buying and why Continue Reading
-
What storage managers are buying and why, page 4
What storage managers are buying and why Continue Reading
-
Nokia E62 thin mobile productivity device
In this product review, John Shepler weighs in on Nokia's new E62 mobile device for Cingular Wireless. Continue Reading
-
Strategy clinic: Deciding which activities to measure to provide meaningful insights
I have always believed in 'doing' rather than self-monitoring, but reluctantly agree that the IT department needs to provide meaningful metrics on its activities. We have no shortage of things to measure, but how do we decide which are the most ... Continue Reading
-
Nmap Technical Manual
By now, most infosec pros have heard of Nmap, and most would agree that even though the popular freeware tool is invaluable, installing, configuring and running it in the enterprise is no easy task. With that in mind, SearchSecurity.com, in ... Continue Reading
-
Security Blog Log: Taking Google Code Search for a spin
This week, the blogosphere is buzzing about Google Code Search. Despite concerns that the tool will aid attackers, some see it as a boost for security. Continue Reading
-
Inside MSRC: Public vulnerability disclosures on the rise
Even though irresponsible publicly disclosed vulnerabilities seem to be on the rise, Microsoft's Christopher Budd discusses how the software giant was able to quickly release a fix for the recent VML flaw, plus offers best practices on how to make ... Continue Reading
-
School district expels outsourced backup, enrolls CDP
Revere School District dumps tape and outsourced backup, and deploys SonicWall's continuous data protection product. Continue Reading
-
Test your IQ: Business continuity -- ANSWER
This type of plan specifies a means of maintaining essential services at the crisis location. Continue Reading
-
DPM's Diary: 3 October 2006
Monday Continue Reading
-
Alliance and Leicester to overhaul core systems
Alliance & Leicester has announced plans replace many of its core banking systems with Accenture’s Alnova Financial Solutions banking platform under a three-year IT-led business transformation programme. Continue Reading
-
ZERT rekindles third-party patching debate
This week in Security Blog Log: IT security pros express more reservations about third-party patching, including the CEO of a company that released one a few months ago. Continue Reading
-
PING with Suzanne Hall
In this exclusive interview with Information Security magazine, Suzanne Hall, AARP director of IT operations and security, examines how security professionals can enable telecommuters and mobile workers while keeping their data secure. Continue Reading
-
More from SearchSecurity September 2006
This month's round up weighs the pros and cons of security information management systems (SIMs) plus four case studies illustrating the different roadblocks security managers can encounter Continue Reading
-
On privacy laws, every state is one of confusion
It's getting increasingly difficult for US firms to comply with regulations . David A. Meunier feels that it's time to develop safeguards and processes for this ever-changing regulatory environment. Continue Reading
-
Top 5 free Windows security downloads
The place where you can find free tools that help you crack passwords, remove troublesome spyware and enhance network security. Check out our five most popular tools and find out what you've been missing. Continue Reading
-
Symantec Dark Vision app monitors underground IRC servers
New research project keeps tabs on the hacker underground, providing new insight on activities like credit card theft and spamming. Continue Reading
-
NetApp operations chief talks growth
Tom Georgens, executive vice president and general manager at NetApp -- also rumoured to be in the running as next CEO -- discusses what's driving its growth. Continue Reading
-
Storage upstarts are tipping the vendor scales
The big storage vendors are always trying to steal a piece of each other's pie. But some small tech upstarts might play big parts in determining who comes out on top. Continue Reading
-
Security Blog Log: Word doc scam evades spam filters
Also this week: A researcher gets a harsh reward after flagging a University of Southern California Web site flaw, and more blogs are keeping an eye on the latest security breaches. Continue Reading
-
Protecting wireless networks: Step 3
Security testing expert Kevin Beaver covers the tools and techniques needed to find and exploit insecure wireless networks. Continue Reading
-
Protecting wireless networks: Step 2
Security testing expert Kevin Beaver covers the tools and techniques you'll need to find and exploit insecure wireless networks. Continue Reading
-
Wireless network security testing
Attack your own wireless networks to find vulnerabilities before malicious hackers do. Continue Reading
-
Identity and Access Management Security School
This Security School explores critical topics related to helping security practitioners establish and maintain an effective identity and access management plan. Continue Reading
-
Risk management: Data organization and impact analysis
This first article of the Insider Risk Management Guide explains how to data organization is the first step in implementing insider threat controls. Continue Reading
-
Risk management: Implementation of baseline controls
This fourth article in the Insider Risk Management Guide examines the implementation of baseline controls. Continue Reading
-
Risk management: Baseline management and control
Identifying baseline controls is the second step to implementing insider threat controls as described in this article from SearchSecurity's Insider Risk Management Guide. Continue Reading
-
Risk management references
References for our Insider Risk Management Guide. Continue Reading
-
Risk management audit
This article explores the audit function in the insider risk management process. Continue Reading
-
Look through the over-hyped storage terms; find the value
Storage expert Marc Staimer discusses the storage vendor trend of using over-hyped terms to sell their products, and how you can find the true value in what they're selling. Continue Reading
-
Security blog log: Fear and loathing in MS06-040's wake
This week, security bloggers wonder if some of the MS06-040 warnings have gone too far. Meanwhile, Symantec uses its blog to warn about the timed release of exploits. Continue Reading
-
IT bosses preparing for Byte Night
About 250 senior IT professionals will take part in the annual Byte Night charity sleep-out on London’s Embankment on 22 September in an effort to raise £300,000 to combat child homelessness. Continue Reading
-
Inside MSRC: Time to rethink security workarounds
Christopher Budd of the Microsoft Security Response Center recommends implementing one of several security workarounds to ensure a secure infrastructure until this month's most important Windows update can be installed. Continue Reading
-
Countering attackers with NAC, IPS
Product review: Information Security magazine's Wayne Rash says ForeScout Technologies' flexible CounterACT appliance combines NAC with IPS and is worth the investment. Continue Reading
-
Akonix A-Series offers complex, best-of-breed IM security
Product review: Information Security magazine's Sandra Kay Miller says The Akonix A-Series instant messaging security appliances works well but needs better documentation. Continue Reading
-
Thwarting IM management challenges
Product review: Information Security magazine's Sandra Kay Miller says Symantec's IM Manager 8.0 has limited public network features, but offers excellent reporting Continue Reading
-
Security event management, no strings attached
Product review: Information Security magazine's Joel Snyder says Check Point's vendor-agnostic Eventia Analyzer 2.0/Eventia Reporter is worth consideration despite limited BI options. Continue Reading
-
Are smaller companies storage-stupid?
Storage guru Jon Toigo questions the buying process of storage in SMBs . Continue Reading
-
Endpoint security quiz answers
The answers to the Endpoint quiz Continue Reading
-
Web services represent security's next battlefront
The evolution and mainstream use of Web services has placed the nascent technology in the crosshairs of attackers, and one firm in particular says it can mitigate the threats. Continue Reading
-
PING with Heidi Kujawa
Heidi Kujawa, director of enterprise architecture services for Sony Pictures Entertainment, explains how combatting piracy takes more than just keeping bootleggers out of the theatres Continue Reading
-
Beyond HIPAA and GLBA
Most firms are familiar with HIPAA, Gramm-Leach-Bliley and Sarbanes-Oxley, but newer regulations are pushing certain industry sectors to adopt strong authentication Continue Reading
-
Automated provisioning quiz answers
the key questions answered Continue Reading
-
Authenticating Windows
Three options for Windows authentication with eSSO clients. Continue Reading
-
Endpoint security quiz
Take this five-question quiz to see how much you've learned about endpoint security. Continue Reading
-
Inside MSRC: Debunking Excel exploits
Microsoft's Christopher Budd puts the magnifying glass to Microsoft's July bulletinsand says one alleged Excel exploit isn't what it seems. Continue Reading
-
XML Security Learning Guide
Securing XML is an essential element in keeping Web services secure. This SearchSecurity.com Learning Guide is a compilation of resources that review different types of XML security standards and approaches for keeping your XML Web services secure. Continue Reading
-
Case study: A valuable solution
A new telephony and call centre solution from Inter-Tel has transformed the way that e.surv Chartered Surveyors is able to work. Continue Reading
-
Storage Word Search: Summer IT fun
How about some summer storage fun? Try out SearchStorage.com's Word Search game. See if you can find the 15 terms listed. Continue Reading
-
UK IT leaders plan a night under the stars for charity
About 250 senior IT professionals will take part in the annual Byte Night charity sleep-out on London’s Embankment on 22 September in an effort to raise £300,000 to combat child homelessness. Continue Reading
-
SMB finds the perfect host
When All3Media, a medium-sized TV programming producer, inherited an inflexible communications system, it turned to a more appealing, hosted alternative. Continue Reading
-
Questions that need to be answered on NHS IT plan
Four years ago the government announced to a grateful NHS a national IT programme that would become the world's largest civil computer scheme. Continue Reading
-
Lenovo goes for gold with SMBs
When Shelley Rudman unexpectedly won a silver medal for her valiant efforts in the skeleton at this year’s Winter Olympics, the world knew she’d gained her unprecedented achievement for the UK in a matter of seconds. In fact, the world expected to ... Continue Reading
-
Industry chiefs to declare war on for-profit cyber criminals
IT industry leaders reaffirm the importance of security to a digital economy beset by money-driven cyber criminals. Continue Reading
-
Be careful you don't get more than you pay for with VoIP
Implementing VoIP is attractive for all companies in particular SMBs. However, there are issues to address that may cost you more than what you save Continue Reading
-
Voicing concerns on Skype
Skype has blazed a trail in the Voice over IP arena; its popularity hasn’t gone unnoticed by the hacker community however Continue Reading
-
IT professionals set for annual charity sleep-out
Senior IT professionals are gearing up to on London's Embankment near Tower Bridge on Friday 23 September 2005. The aim is to raise more than £250,000 for disadvantaged children. Continue Reading
-
VoIP and IPT are hot tickets for the IT industry
Voice over IP (VoIP) and IP telephony (IPT) are the hot tickets in the current IT industry. In the space of two weeks in late May and June 2005, two major European trade shows — VON 2005 and VoIP for Business —have each exhibited a welter of ... Continue Reading
-
Lost at sea: securing the channel
As attacks seem to proliferate almost unabated, it’s worrying to think that of the three interested parties in the security technology market — the technology makers, the technology sellers and the technology users—not everyone shares a common view ... Continue Reading
-
Riding the wave of change
CIOs can thrive as pace of change quickens, argues Des Lee Continue Reading
-
Business continuity keeps companies running
As we speak, it appears that disruption to IT services by the London bombings was minimised due to effective and realistic business continuity strategies. Sally Flood sees how you construct them. Continue Reading
-
Business continuity: Keep on running
Too many plans for business continuity do not reflect the true risks. Sally Flood looks at risk assessment and the creation a realistic strategy. Continue Reading
-
Phishing for the missing piece of the CardSystems puzzle
A banking insider examines the ties between customized phishing attacks this spring and the CardSystems breach announced soon after. Don't miss his revelations on how they're linked and what the phishers really needed. Continue Reading
-
Cisco in talks to acquire EMC?
Summary: Word has it Cisco is considering a $43 billion acquisition of EMC. With all the storage mergers going on, is this possible? Continue Reading
-
How to survive a data breach
When Colin Crook offers advice on how companies should deal a security breach, he speaks from experience. He was CTO of Citicorp [now Citigroup, parent company of Citibank] 10 years ago when a hacker penetrated the company's network.
Crook... Continue Reading
-
delivering profits
-
five star reception
-
access all routes
-
B&Q boosts efficiency and cuts costs by replacing e-mail with workflow software
-
Storage 911: How to troubleshoot your storage
Our emergency guide takes you through the steps you can take to prevent disaster, and then, more importantly, offers an organized list of usual suspects, from the complex to the deceptively simple. Continue Reading
-
Controlling IT waste and redundancy through recentralization
A typical decentralized organization has many different departments such as accounting, HR, and manufacturing—all are defining and building IT infrastructures to support applications. In a decentralized environment, there is a structure in ... Continue Reading
-
Learning Guide: Low-cost storage
Resources on low-cost networking, iSCSI, SATA and IP storage Continue Reading
-
Lead from the top
The starting line for effective data security is at board level, writes John Kavanagh in this review of current thinking and... Continue Reading
-
The acceptable rules of the mobile game
Mobile networks allow you to connect to your network from almost anywhere by the appropriate methodology. Yet that may also mean... Continue Reading
-
Managed services: Looking to the long term
IT directors looking for an easy way to manage increasing volumes of data by buying more hardware could be storing up problems... Continue Reading
-
Healthcare system designer explains HIPAA pitfalls
Kate Borten is president of The Marblehead Group Inc., has more than 20 years of experience designing, implementing and integrating healthcare information systems and is author of HIPAA Security Made Simple. This Q&A focuses on how ... Continue Reading
-
Winning the cyber arms race in the classroom
In the struggle for cybersecurity, Lenny Zeltser's most important weapons are the classroom and the pen.
For the past few years he has taught part-time at the SANS Institute, creating a course on how to analyze malicious software... Continue Reading
-
Whisky galore with IP
Chivas can toast future success thanks to a cost-effective IP data network Continue Reading
-
Financing the future
Don't get a headache working out the best ways to pay for hardware and software. Danny Bradbury offers a user-friendly guide to... Continue Reading
-
Grid gobbledygook hits storage
Fearful as always of missing the boat, storage vendors are jumping on the grid bandwagon, unveiling visions that are about as useful today as a chocolate teapot. Continue Reading
-
IP everything, essentially
What are the fundamental deliverables of IP networks? How can you use IP networks to gain financial benefits in addition to... Continue Reading
-
The basis of profitability
Not so long ago, you didn't have much choice - your IT and communications requirements were acquired, implemented and maintained... Continue Reading
-
The gift of CRM
For Red Letter Days, a provider of gift experiences for corporates and consumers, a CRM system was essential to give it market... Continue Reading
-
Management matters
Cath Everett finds out how you stay on top of networking. What are the management issues related to your telecoms and networks... Continue Reading
-
Storage Management Survival School: Lesson five
In this session, Jamie Gruener examines the steps you should consider in designing a tiered storage model, what the pitfalls are and the overall benefits. Continue Reading
-
Undercover operations
Computer crime is on the rise, but collecting admissible evidence is a tricky business. Helen Beckett gets expert advice on what... Continue Reading
-
Is the national programme for NHS IT set to be 'the biggest gamble in the world'?
The private concerns of clinicians and IT professionals about the national programme are not being addressed, despite the front... Continue Reading
-
Achieving the goal of CIO
What exactly does a chief information officer do?Paul Burfitt, global CIO at AstraZeneca, analysed the various aspects of his job... Continue Reading
-
Thought for the day: Flights of fancy
The Windows versus Linux debacle continues to escalate into a heady mix of emotion, mud-slinging and complexity Continue Reading
-
On the right side of the law
What are the legal and regulatory issues that could affect the running of your company? What are the ramifications of the Data... Continue Reading
-
Learning Guide: SAN-based backups
Some of the best advice on the ins and outs of SAN-based backups Continue Reading
-
How to secure a wireless Lan
Stuart Okin and Ian Hellen at Microsoft UK give their opinion on how different forms of data encryption can protect wireless Lan... Continue Reading
-
IT directors foresee technology revolution continuing in comms
There are those who hold that the IT revolution has petered out with no more breakthroughs to come. But IT directors attending... Continue Reading
-
Fujitsu won £800m Post Office contract after misrepresenting itself, says lawyer
High Court claim by ex-employee makes damning accusations Continue Reading
-
Thought for the day: Flights of fancy
Launch a Java-based office suite? Simon Moores questions the sanity of any company that would consider doing so, even if it is... Continue Reading
-
What's in an IT name?
What exactly does a chief information officer do?Paul Burfitt, global CIO at AstraZeneca, analysed the various aspects of his job... Continue Reading
-
Essential contacts
The security arena is like every other aspect of the IT industry, suppliers and special interest groups come and go. However,... Continue Reading
-
Director's cut: Learning to spot winning technologies
Faced with a stream of new technologies it is vital that IT directors keep abreast of the latest developments and are aware of... Continue Reading
-
The Heat is on
Since the 1960s, Moore's Law has described the progress of the IT industry but overheating could slow down the pace of change Continue Reading
-
Lessons to be learned from Chinook tragedy
Since 1997, Computer Weekly has studied the IT-related lessons from the crash of Chinook helicopter ZD576 on the Mull of Kintyre... Continue Reading