Stories by Brian Fonseca

Secure transactions sought

Some of the internet's heaviest hitters were meeting yesterday in the US in an attempt to organise a global system to help ease the privacy and security concerns of online shoppers that may be wary of making purchases over the web.

IT Gets an Assist with Security

Still bruised from bearing a myriad of cyberattacks during the last six months, U.S. companies will soon be able to access an ISAC (information sharing and analysis center) built to anonymously receive, define, and alert its members of any security issues that cross its path.

Microsoft admits Outlook to blame in worm fiasco

In a rare mea culpa, Microsoft admitted that vulnerabilities in its Outlook e-mail program helped propagate the damaging ‘IloveYou' worm, prompting the software giant to release a free security upgrade to protect users from opening and spreading computer viruses.

Tivoli Targets Storage Management

Tivoli Systems Inc. strengthened its storage management arsenal on Tuesday at its Planet Tivoli user conference here with new products and partnerships designed to take advantage of the growing market segment and its importance to emerging e-businesses.

Microsoft admits shortcomings in Outlook

In a rare mea culpa, Microsoft this week admitted that vulnerabilities in its Outlook e-mail program helped propagate the damaging "I Love You" worm, prompting the software giant to release a free security upgrade to protect users from opening and spreading computer viruses.

Opinion: Love letter post-mortem: users, vendors not amused

It took less than 24 hours for the "ILoveYou" worm to mercilessly strike and infect PC users and businesses around the globe; yet it could take months before the technological holes and social mechanics that led to the Internet massacre are fully addressed.

Microsoft Secures Outlook

In a rare mea culpa, Microsoft Corp. last week admitted that vulnerabilities in its Outlook e-mail program helped propagate the damaging "I Love You" worm, prompting the software giant to release a free security upgrade to protect users from opening and spreading computer viruses.

Analysis: Love Letter Postmortem: Users, Vendors Not Amused

It took less than 24 hours for the "I Love You" worm to mercilessly strike and infect PC users and businesses around the globe; yet it could take months before the technological holes and social mechanics that led to the Internet massacre are fully addressed

Symantec to Scan Yahoo Mail for Viruses

Symantec Corp. has been entrusted by Internet powerhouse Yahoo Inc. to protect its Yahoo Mail users from e-mail attachments that could harbor malicious code attacks.

Love Letter Postmortem: Users, Vendors Not Amused

It took less than 24 hours for the "I Love You" worm to mercilessly strike and infect PC users and businesses around the globe; yet it could take months before the technological holes and social mechanics that led to the Internet massacre are fully addressed.

Managed Service Providers are Experiencing Success

Businesses are beginning to reap benefits from handing off infrastructure management and IT staffing to MSPs (managed service providers), which in turn are finding that the increasing competition in this growing sector brings needed assistance along with the usual challenges.

Cryptek Debuts Network Security Hardware

Cryptek Secure Communications LLC at the Networld+Interop conference on Tuesday introduced its hardware-based DiamondTEK network security product line, thus joining the growing field of computer companies looking to provide security for e-commerce applications.

Tivoli, vendors beef up reporting capabilities

Making use of the end-to-end reporting capabilities of a company's enterprise is becoming much more of a critical factor for network management during these days of the booming e-business age.
At NetWorld+Interop in Las Vegas this week, network administrators and CIOs can expect to see the software and hardware aspects of the subject addressed behind a host of products designed to make clear and quick sense of data being fed into and emerging from a Web-enabled infrastructure.

[]