Last year was the worst year ever for vulnerabilities, says anti-virus software maker F-Secure, in part because virus writers and spammers got together. Here's what you can do to prepare.
Heterogeneous attacks, voice over IP shakedown, and prime time Web services easing security: predictions from an eminent security researcher for 2004 and beyond.
The Eclipse Project, an open source development initiative, is growing by leaps and bounds.
IBM makes its third document-management acquisition as retention regulations spur market growth.
A preliminary ruling in December sets this week as the deadline for providing specific Linux code misappropriation examples to IBM. "Derivative works" is the focus of SCO's argument.
While many products today talk a good game about policy-based data management, Arkivio is once again ahead of the pack.
From Linux synchronization and denial of service attacks to some good news about spending on security—a quick look at this week's other security news.
The mainframe is the hub of a network of connected devices, making it ever more vulnerable to attacks.
How integrating security code testing into the development cycle saves time and dollars
Governments have made cyber-crime a matter of public policy. But without an organized, multi-disciplinary, international approach, the problem will remain.
We spoke recently with Jim Rhyne, a distinguished engineer and eServer tools and enterprise modernization architect with IBM. Our discussion ranged from the scope of enterprise modernization (hint, companies often fail to adequately anticipate skills modernization), the phenomenon of mainframe brain drain (Rhyne isn’t convinced that there’s anything to it), application modernization strategies and, of course, the maturity of the Web services standards themselves.
Worldwide disk storage systems sales could easily reach an exabyte by next year.
Customers losing patience with negotiating database licenses are increasingly adopting open source DBMSes such as MySQL
Analysts from professional services firm Tallán explain the trends IT must manage next year.
Spending on storage and software should grow fastest next year. Among CIOs' top priorities next year: cost reduction, security, application integration, and Sarbanes-Oxley compliance.
Clustered file system advocates have positioned their solutions as alternatives to the monolithic file systems (such as WAFL).
Companies must protect their data as well as their reputations.
Top growth areas: firewalls, IDS/IPS, virus scanning, and vulnerability assessment. By 2005, security managers plan to buy all-in-one appliances that combine these functions. Infonetics Research also