Three 2011 Security Resolutions (for the uninitiated)
Chances are, when it comes to keeping your data safe, you aren't doing many of the things that you should. In fact, most of us don't do the good data hygiene things we should. Here's a short list of three essential things you need to be doing if you are not already.
Meet The "SMS of Death"
If a pair of German security researchers are correct, a successful SMS attack could cripple vast segments of mobile networks.
Trojan Targeting Android Phones
Geinimi malware displaying botnet characteristics can compromise a significant amount of information on a user's smartphone.
Apple May Face More Privacy Lawsuits
Without definitive laws defining data privacy rights, Apple and other companies involved in developing mobile applications are likely to be targeted by consumers turning to the courts for protection.
Facebook Value Leaps 56% To $41.2 Billion
The social media giant led strong gains among privately held social media companies, including Groupon, Zynga, and Twitter, in the second half of 2010, finds analyst study.
Amazon Says Kindle Best Selling Product Ever
Apple iPad owners are also buying e-readers according to the online retailer, which announced that sales of the Kindle have surpassed its previous all-time bestseller, "Harry Potter and the Deathly Hallows."
Why SMBs Aren't Buying DLP
Cost, complexity, and a dearth of complete solutions limit adoption rates for small and midsize businesses; revamping the architecture and packaging of DLP solutions is key to winning the SMB market.
SCADA Security Heats Up
The use of Supervisory Control and Data Acquisition (SCADA) devices is growing. That growth is expected to continue to soar. According to research firm Frost & Sullivan SCADA revenues will grow from $4.6 billion last year to nearly $7 billion in 2016. Question is: What about security?
Why Don't Firewalls Work?
Even the best firewalls might fail an audit -- or get hacked -- if your enterprise doesn't follow proper change and configuration management practices. Here's a look at some of the common pitfalls that trip up firewall administrators
Targeted, Skilled Attacks Shaped 2010 Threats
While high-profile breaches like that of Google and the Stuxnet worm served as a wake-up call for many organizations, attackers continue to 'mow through' enterprises' systems and networks
State Department Announces Cybersecurity Post
The position, planned before the recent WikiLeaks exposure, will report directly to Secretary of State Hillary Clinton and work to prevent data breaches involving confidential diplomatic information.
Why All The Big Deals?
Have you noticed that there seems to be a lot more "big" deals when it comes to storage acquisitions lately? Dell-Compellent, EMC-Isilon, HP-3PAR, EMC-Data Domain. This is not to say that there hasn't been smaller deals and part of the reason for the increase in big deals is perception, there is more to discuss which generates more press. There is however strategic reasoning behind the increase in larger deals.
'Tis Attack Season: 5 Ways To Fight Back
For most of us, it's time for sleeping in, spending time with family, and ignoring e-mail. For criminals, it's time to go to work. Scammers are looking to exploit e-card traffic, sales promotions, and the general jolliness of Internet users. What better time to attack unwatched enterprise systems, siphon out data, and dig deeper into networks?
SIEM Gathers Steam In 2010
Strong market growth rate attracting new start-ups, but biggest slices are increasingly being hoarded by a very short list of SIEM vendors
What If Data Services Were Free?
Data services is my term for the storage software that most storage hardware vendors include to make their hardware a solution. The capabilities of these software applications include the basics like volume provisioning and advanced features like file services, snapshots, thin provisioning and replication. What if you could get these software functions for free and apply them to the hardware of your choice?
Hulu Nixes IPO Plans
The online video site may look to its existing investors to raise capital, now that it's dismissed plans for a public stock offering, say reports.
Apple Unplugs WikiLeaks App
Other applications that connect users to Julian Assange's rogue Web site are still available for Google's Android platform.
Security Design Fail
It's common for routers to enable an HTTPS interface so that the device can be remotely administered. However, as was made clear this weekend, many routers are secured with hard-coded SSL keys that can be extracted and used by others.