Verizon's VERIS Aims To Push Security Beyond Fuzzy Numbers
When it comes to sharing data in IT security the bad guys always seem to be way ahead. They employ far-flung networks used for sharing stolen data, buying and selling exploits, and information on how to launch successful attacks. However, when it comes to enterprises sharing attack and breach incident data there has not been a lot of sharing going on.
WikiLeaks Missives Contain Many Tech Secrets
The diplomatic cables include references to the alleged execution of an IT director in Iran, cybersecurity weaknesses in Brazil, and friction with Germany over information sharing.
Are You Ready For High Speed Storage Interfaces?
A new wave of high speed storage interfaces is on the way offering improved storage I/O performance To see the expected performance improvement you have to do more than simply add drives with the new interface and install a host bus adapter in the server, you have to make sure every link in the I//O chain is ready.
Wolfe's Den: Airport Scanner Patents Promise Not To Show Your 'Junk'
Rapiscan, the company supplying the controversial x-ray backscatter screeners, has won a patent for a machine which detects threats "with minimum display of anatomical details." Its competitors, and body scanner pioneer Martin Annis, are also pursuing enhanced privacy approaches. Here are the technology details.
5 Airport Body Scanner Patents Stripped Down
Here's a deep dive on five patents applying X-ray backscatter technology to airport contraband detection. These screening machines have been much in the news recently, amid controversy regarding both their effectiveness and the amount of radiation exposure to which travelers are subjected. The patents we'll look at are from prime players in the airport body scanner field. This list is led by Rapiscan Systems Inc. , of Torrance, Calif., which in 2009 won the TSA contract to supply whole-body imag
Taming the Beast: Preventing/Detecting Insider Threat
While many companies deal with the problem of insider threat, there are some practical things that can be done to both prevent and detect insider threat. Always remember, prevention is ideal but detection is a must.
Shuttle Discovery Launch Delayed
External fuel tank repairs are in process and NASA says the earliest Discovery will make its final trip to the International Space Station is Dec. 17.
Sophos Sees Macs OS Infected With Windows Sludge
Anti-virus firm Sophos shows that while Macs may be under increasing malware threats, most of the sludge its anti-virus software found targeted Windows systems - Apple users aren't out of the woods.
Thanksgiving IT Help
Tips for helping family members secure their computers for safe internet browsing and online shopping
What About Biometrics?
Integrating fingerprints in a standard way so that Web and enterprise applications can take advantage of them
Does SSD Make Sense In The Small Data Center?
Solid State Storage is often thought of as being used in one of two extremes. Either in the high end enterprise to acceleration databases or in the consumer netbook, smartphone market. The truth is that solid state storage can be used in a wide variety of applications in businesses of all sizes. The small data center with two to three servers should not exclude SSD from it's consideration.
Securing The PDF
New Adobe Reader X sandbox and Invincea's virtualized Document Protection offer new methods to combat PDF attacks
Alureon Malware Bites Windows 7
The threat's rootkit gets an upgrade to compromise Microsoft's 64-bit operating systems by defeating driver-signing security.
Researchers: Be Wary Of New Trojan Attacks
A yet to be named developer has released a free software development kit for a new Trojan horse considered to be similar to the Zeus banking Trojan - prompting a warning from researchers at a German security firm.