Latest Technology News from the TechTarget Network
Thursday, February 3, 2011
- Ignoring mobile hype? Don't overlook growing mobile device threats
It may seem like more mobile hype, but Senior Site Editor Eric B. Parizo writes that there are legitimate reasons why mobile device threats may be on the rise.
- IT executives weighing cloud risks against the benefits
As IT executives decide whether cloud risks outweigh the benefits of moving to the cloud model, the debate continues.
- DDoS remains top telecom security threat, firewalls and IPS targeted
In addition to escalating DDoS attacks, hackers have turned some of the very devices designed for telecom security into attack vectors, according to a recent survey.
- When will CRM join the analytics revolution?
Companies have launched successful analytics programs in areas like fraud detection and drug development, but when will analytics become pervasive in CRM systems? The time is coming, says Denis Pombriant.
- Microsoft, Google sweeten online service SLAs
As Microsoft readies Office 365, the company tweaked its Online Services lifecycle policy. Google also improved its service-level agreements to cut planned downtime.
- Companies looking ahead to customer service technology investments
Cloud, social media and virtualization will be just some of the places organizations spend their discretionary IT dollars in the coming year.
- VMware charges partners for Solution Enablement Toolkits
VMware?s popular Solution Enablement Toolkits had been free, but now VMware partners must pay for these templates, documents and other sales resources.
- Mobile cloud security: How to address the issues
UK enterprises that are implementing mobile cloud services will find themselves tackling mobile cloud security issues. In this Q&A, learn how mobile cloud security can be addressed by securing mobile clients and implementing a centralised strategy.
- The Open Group to look at EA, SOA and cloud computing
Included in sessions are cybersecurity, enterprise architecture - with an eye for business transformation. As always, skills certification programs related to TOGAF 9 will be a major draw.
- Interxion hits colocation sweet spot and sees market shares soar
Colocation provider Interxion recently made its debut on the New York Stock Exchange and saw its shares soar 18%; plus more news in brief.
- Microsoft to address 22 flaws in Patch Tuesday updates
In its advance notification, Microsoft said it would issue 12 bulletins, three critical, addressing holes in Windows, Internet Explorer, Office, Visual Studio and IIS.
- XML firewall security guide: Prevent XML vulnerabilities and threats
This section of the XML Web services Tutorial highlights the functions and capabilities of the XML firewall, how the features of an XML firewall compare to other firewalls, and offers advice on how to prevent XML vulnerabilities and stop XML attacks.
- Waledac botnet showing resurgence with thousands of stolen email credentials
Researchers at security firm, Last Line of Defense, have discovered a cache of hundreds of thousands of stolen email credentials and FTP passwords.
- XML encryption and WS-Security tutorial: Essential elements of Web services security
WS-Security and XML encryption are two essential elements of Web services security. In this XML encryption and WS-Security tutorial, which is a part of the SearchSecurity.com XML Web services tutorial, learn more about the security threats and concerns that WS-Security addresses, as well as the importance of WS-Security and the differences between WS-Security and SSL.
- EMC extends e-discovery, information governance strategy; more news
EMC extends information governance and e-discovery platform; Index Engines provides electronic discovery through the cloud; eSilo targets disaster recovery through the cloud; Pancetera makes it easier to move virtual machines across storage arrays; and more data storage news.