Looking deeper within malware yields fingerprints of the hackers who write the code, and that could result in signatures that have a longer lifetime than current intrusion-detection schemes, Black Hat 2010 attendees will be told next week.
Stories by Tim Greene
Avaya is overhauling its contact center software with features designed to boost productivity and also to demonstrate that the company is brimming with innovation it hopes will attract new customers, and keep those it acquired along with Nortel's enterprise division.
Firewalls, VPNs, SSL, PKI, encryption - this quiz will test your knowledge
Strangeloop is coming out with a Web-acceleration appliance it says can boost online sales and give Web sites higher ranking among search engines.
Managed service provider Virtela has revamped its infrastructure with a virtualized platform off of which it will run a range of services, the first of which is flat-fee WAN optimization service with a money back guarantee if customers are unhappy with performance.
While Apple is set to rev up the hype machine at its Worldwide Developers Conference (WWDC), Avaya seems about ready to introduce an iPad-like device for business users that might steal a little of Steve Jobs’ thunder. The Avaya device acts like a phone, has support for video and all manner of wireless technology.
Start-up Infineta Systems is coming out of stealth mode just in time to reveal that it is working on one of the knotty problems raised this week at the EMC World conference – how to connect data centers efficiently for backup, replication and cloud services that rely on live migration of virtual machines.
New computer forensic tools will make it possible to recover more data from corrupted hard drives so long as the missing files haven't been overwritten.
Session Initiation Protocol will remain the driver of innovation in unified communications for the next decade, putting it on par with TCP/IP as a networking game changer, Avaya's CEO told an overflow crowd at his Interop keynote address Tuesday.
When companies publicly declare that they have suffered a data breach, it's best not to reveal how many individual records were involved if they don't want to take a hit in their stock prices, according to a study.
Despite the increasing awareness of penalties and the damage that losing personal data can do to corporate reputations, network security executives are getting less certain that they can figure out if personal data has been compromised when corporate laptops are lost or stolen.
At Voicecon's opening Monday in Orlando, vendors are poised to push unified communications, and Microsoft is stepping into the spotlight by announcing alliances with other vendors whose gear interoperates with Microsoft Office Communications Server.
SAN FRANSISCO -- Cloud security loomed over the RSA Conference last week as a major concern of business, but worry about the threat of cyberwar was also strong, with officials from the White House and FBI weighing in to encourage private participation in government efforts to defend information and communications networks.
Recent Internet attacks from China against Google and other U.S. companies will more than double this year if the pace during the first two months continues, a security expert says.
Information gathered about a newly discovered botnet called Kneber indicates that multiple infections by different malware on the same host could work together as a sophisticated mechanism to give all the malware a better survival rate.