The Downsides Of OpenFCoE
A few weeks ago I wrote an entry about software based Fibre Channel over Ethernet (FCoE) called Open FCoE being offered by Intel. The immediate responses were questions asking if this is a sign of the end for the hardware based HBA providers? Open FCoE has a lot of promise but the downsides of OpenFCoE prove that it may not be for everyone.
DAM Market Observation
Despite talk about the lack of innovation in the data security market, excellent technologies like DAM and DLP have been available for years before customers embraced them
Security Departments Stretched Too Thin, Firefighting
While application vulnerabilities, mobile computing, and malware top the list of IT security vulnerabilities and threats, a just released survey from ISC2 and Frost & Sullivan reveals an underlying, more systemic threat.
Clearing The Air On DAM
There are two very important things to understand: First, a database firewall and a database activity monitor (DAM) are exactly the same things! Second, a database firewall can upset normal IT operations
Another Side Of B-Sides
The "unconference" across the street from the RSA show in San Francisco last week was shaped, in part, by recent security events
Hacking The APT
Google, SRA, Mandiant, McAfee execs profile the advanced persistent threat and suggest ways to derail it
A Chat With The Cybersecurity Czar
Howard Schmidt talks global cooperation in cyberattack prevention, and how the feds should share threat intelligence with private industry
Solving Scale Out Storage's Dark Side
In a recent entry we discussed a concern with scale out storage, making sure the utilization of processing, power and resources remains efficient. The last thing you want is a storage system that, while it can scale to limitless capacity, also requires limitless power and data center floor space? The good news is that some vendors are aware of these concerns and have some solutions for you to consider.
SSDs Prove Tough To Erase
Techniques that reliably erase hard disk drives don't produce the same results for solid state drives, warn University of California at San Diego researchers.
Security Coming To Mobile And Embedded Devices
Security firm McAfee expects 50 billion mobile and connected embedded devices by the year 2020. And guess who is promoting new tools promising to protect them. But is this a layer of protection we are going to need?
Hacks From China Strike Canadian Government
CBC is reporting that attacks from IP addresses based in China have managed to successfully breach networks within the Finance and the Treasury Board of Canada, as well as Defence Research and Development Canada. The attack is the latest in a string of attacks aimed at high level government agencies.
RSA: The Saw Six Of Tradeshows
Predictably scary, RSA offers a glimpse into the latest threats and security challenges. In this sequel, social engineering goes after social networking in a big way.
Feds Arrest 99 For Identity Theft, Card Fraud
A federal grand jury has charged the Armenian Power group in California with credit card skimming, check fraud, and other sophisticated white-collar crimes that garnered $20 million.
Busting DLP Myths
Misinformation has stopped many organizations that could have been helped by the technology from moving forward with implementations