Security Podcast -- Week of 12/06/06
Join Curt Franklin in this Radware sponsored Security Podcast. This week's podcast includes security news; The Worldwide growth of Spyware and Adware; Detecting and Defeating Rootkits | Click to listen...
New Word Zero-Day Attacks Begin
Microsoft acknowledged that specially crafted Word documents could be used to seize a computer, and urged users to use care when opening Word files sent by untrusted sources or that
NWC's NAC Battleground
Network Access Control, or NAC, has emerged as the technology approach of choice for securing enterprise assets. Twelve leading NAC vendors entered the NWC NAC Battleground to stake their architectural
UDcast Offers Recovery
UDcast, On Call, and Intelsat are providing the United States DHS and FEMA with high performance disaster recovery communications systems
SenSage Intros Platform
SenSage announced SenSage 3.6, a scalable platform for log management, compliance auditing and security information management applications
Sourcefire Launches Solution
Sourcefire announced the availability of OfficeCat, a security tool that enables users to identify potentially threatening Microsoft Office files
Elemental Intros 3.0
Elemental announced ESP 3.0, the next-generation release of the highly recognized and award-winning Elemental security platform
Run for your lives... the ITU is trying to make itself useful
At Germany's HLRS, optical fiber and DWDM are cheaper than IP
What's the Key to Excellent Encryption?
Data security has become a primary concern for corporations and consumers alike. As identity theft becomes more pervasive, companies are held more accountable for the way they protect personal and corporate information. Many products and processes exist for encrypting information...
Does De-Duplication Have Drawbacks?
Data de-duplication is certainly a hot topic, and in my opinion deservedly so. The technology offers an exciting solution for users that are drowning in duplicate data. Many environments today store more backup copies of relatively static data than ever...
Bank Picks Cybertrust
Cybertrust was selected to be the trusted security advisor to Bank Sal. Oppenheim Jr & Cie
McAfee Weaves Cisco NAC Into Total Protection
McAfee unveils a revamped version of its enterprise focused Total Protection offering that includes a range of beefed up security features and support for Cisco's network admission control (NAC) technology.
UNFCU Picks PortAuthority
The UNFCU has purchased PortAuthority's ILP solution to protect its confidential information and members' personal data
ArcSight Intros Appliance
ArcSight intros a log management appliance to give customers an easily searchable, high performance, cost effective log data repository
NAC's Missing Piece
The whole of NAC has centered around assessing an endpoint's health and controlling access by granting admission or enforcing quarantine. That's all well and good, but it's not really access
Analysis: Next-Gen Blade Servers
Should you slim down with the newest generation of blade server? Vendors claim the latest systems offer improved flexibility and promise to reduce data center bloat. They're right
Can Office 2007 Prevail In A Web 2.0 World?
Microsoft will market the hell out of its new Office 2007 lineup, but the company faces hurdles persuading existing MS Office partisans they need the upgrade and also the Web
Rollout: Compellent's Storage Center 3.5
Even if it's not quite as easy to manage as arrays that support Microsoft's Simple SAN initiative, Compellent's Storage Center has a terrific mix of high-end features and impressive flexibility.
Interview With Oracle's Ted Farrell
Ted Farrell, chief architect for tools and middleware at Oracle, talks about the business value of implementing a service-oriented architecture.
Will Laptops Get Out-Evolved?
With advances in computing power, storage and high-speed wireless networks, it should be possible by the end of this decade to have a small handheld device that can run most
The Total Cost of a Wireless Network
Still stuck on the business case for Wi-Fi? Our experts can help: We kick off our new TCO series by working with an integrator to map out the total cost
Incident Response Tools
Incident-response tools are becoming increasingly important as new regulations and legislation stipulate disclosure after security breaches. These advancements in memory-dump analysis can help you find a wealth of evidence
To BlackBerry or Not to BlackBerry?
Do I embrace this thing 24/7 and evolve into the genus 'Connected Excessive,' or do I simply throw my BlackBerry in my bag and use it during the workday as
IBM's Blade Server Meter-Reader
A plug-in for its systems-management console, IBM's PowerExecutive energy-management technology monitors and displays how much power each blade is using and how hot it is.