Even in the most sophisticated network operations groups, knowing whether a proposed change to a router or firewall configuration will have its intended effect...
Improving cyber-security may be in the public interest, but to persuade the commercial owners of the countrys critical infrastructure to invest in more secure...
Microsofts patch for a worm-vulnerable security flaw in Windows 2000 is causing problems for some users.Microsoft recently confirmed several "isolated deployment issues" with the...
Microsoft Corp., once known for its tightly controlled, if not opaque, security processes, recently invited a small number of hackers onto its Redmond, Wash.,...
With the release of Backup Exec 10d (formerly code-named Panther), Symantec Corp. is providing IT managers with continuous data protection capabilities, self-service data retrieval...
Symantec Corp.s LiveState Recovery Advanced Server Suite 6.0, like its predecessors, specializes in resurrecting corrupted or damaged systems. However, Version 6.0 gains an important...
Federal agencies and contractors have until Oct. 27 to define a new standard of personal identification. Thats the deadline for compliance with the first...
Customer experience (CX) became the top brand differentiator in 2018, outpacing price, product quality and everything else. Businesses that offer a superior and differentiated...
The trickle-down effect of enterprise IT is as old as business technology. Vendors have long aimed new innovations at enterprises whose deep pockets and...