Spam Close To 2 Year High: 85% Of Mail Now Spam
Nobody really expected spam levels to stay low after the McColo takedown last year and, as a new MessageLabs report shows, they haven't. In fact, spam levels are as high as they've been in 19 months, crossing the 85% level for the first time since September '87.
Cloud Security Needs Its Rainmaker
The Cloud Security Alliance (CSA) made its inaugural splash at last week's RSA Security Conference 2009 in San Francisco. The group kicked off an ambitious white paper that attempts to define everything from the architecture of cloud services to the impact of cloud services on litigation and encryption. It was a herculean effort to try to get this off the ground. And there is still much more work to do -- especially in the one area the group left out.
Application Aware Storage and Protection
In storage, its easy to forget that it is all about the application, especially when it comes to protection and more importantly recovery of that application. There is a wide variety of storage data protection from basic RAID to snapshots. There is an even wider variety of data protection software that provides multiple levels of protection, but between the two there is only rudimentary understanding of the application.
bMighty bSecure Virtual Event: SMB Security On A Budget - Today!
When times get tough, it's all too tempting to push security concerns aside -- especially at small and midsize companies with shrinking IT budgets. Fortunately, you don't have to make that mistake, there are ways to address security issues without breaking the bank. Today -- Wednesday, April 29 -- the bMighty bSecure virtual event brings together business and security experts to show you how
Federal Reserve IT Analyst Arrest Highlights Internal Threat
I've always had a pick with the trite and hackneyed marketing hype among IT security vendors who repeated the "insiders conduct the most attacks," or "Insiders are the greatest risk." This most recent arrest stokes the debate that was rekindled with the recent release of Verizon Business' 2009 Data Breach Investigations Report.
Swine Flu Outbreak Brings Out Swineflu Web Scams
Swine Flu's making headlines and making people nervous, which is leading people to look for swineflu information on the Web. No surprise that the cybercrooks are setting up swine flu scam addresses and sites.
Just Because Security Budget Takes A Hit, Doesn't Mean Security Has To
At last week's RSA Conference in San Francisco, there was as much talk about the economy as there was on IT security. And while the show appeared to pull a healthy number of attendees, at times the show floor seemed filled with more vendor reps and consultants, than IT buyers. But a few studies released last week show while vendor's may like to hype fear, the infosec economy certainly isn't all gloom and doom.
The Real Costs Of Laptop Loss
How many movies have you seen where the bad guy is just about to get caught and interrogated when he bites down on a cyanide capsule and dies almost instantaneously? It's a pretty common scene that I've seen in movies as recent as "The Watchmen." Similar solutions, like virtual cyanide capsules, exist that can address lost or stolen electronic devices, and a study released by Intel and the Ponemon Institute last week highlights the importance of those products.
RSA's Five Big Takeaways
Swag was scarce, attendee counts were down, and a few vendors opted not to exhibit this year, but last week's annual RSA Conference in San Francisco was still the obligatory get-together for security experts and vendors, sprinkled with loads of product and partner announcements and high-profile keynote speakers.
The trouble with a show as large as the RSA Conference, of course, is that you can't see it all. So here's a synopsis of just some of the more memorable moments:
Will SSD Delay FCoE?
In a recent entry we discussed the impact of Solid State Disk (SSD) on the IO infrastructure. Where SSD may have the most significant impact is on the adoption of 8GB fibre vs. Fibre Channel over Ethernet (FCoE). SSD has a performance profile that is worthy of the 10GB speeds of FCoE but will FCoE be adopted quickly enough by IT prior to SSD on 8GB Fibre establishing a foot hold?
The High Cost Of Not Spending On Security
Slashing your security budget might be tempting in these tight times, but a security breach will cost you far more than you save. Recent IT spending surveys show that many tech leaders see security as a top priority whereas others are trimming security spending and putting their organizations at increased risk of a security breach.
Conficker Making Its Move, Finally
After months of hype and, admit it it, hysteria, the Conficker worm has finally been getting getting down to work, spewing spam and pushing popups warning that the user's computers are infected (Ya think?) with viruses.
Taking Some Of The Sting Out Of Data Breaches
Anyone who has suffered a recent data breach involving regulatory or legislative data knows the investigation can be an excruciating process. The investigation is subject to time constraints as to how long it takes time to prepare and notify affected individuals. Statutes may apply to the company requiring customers to be notified within X number of days. And, of course, breaches never occur when it's convenient for the victim. So what can you do to streamline the investigative process and make
Social Networks A New Security Frontline
USA Today ran an interesting story about how cybercriminals are using social media in greater numbers to attack users. What started as a trickle last year has quickly sprung to an open fire hydrant, as criminals turn to low-paid grunts to crack captchas.
What Part Of Disaster Recovery Don't You Understand? (bMighty Wants To Know!)
Disaster Recovery planning and preparation remains one of the great vulnerabilities of small and midsized businesses (and plenty of big businesses, too). Why do so many businesses avoid taking the time and spending the money to prep themselves for disasters that may never happen? The three most common answers are in that question.
DeDupe Team Up
There is a growing trend in storage lately, the concept of a manufacturer tapping another developer to help them compete in the market. This allows two smaller suppliers to team up against the larger suppliers. One of the best examples of this is NAS vendors adding deduplication functionality to their systems.
10 After-Tax-Filing Security Tips
Filing your taxes isn't the end of the story. You've also got to be sure that you the electronic information you submit doesn't fall prey to identity theft. Think it can't happen to you? Tell that to the 10 million Americans who had their identity stolen last year.
Being Secure While Being Green
Tossing out digital devices with data on them is a security risk. Disposing of digital devices improperly, with or without data present, is an environmental risk.
NSA Does Not Want To Lead U.S. Cybersecurity Efforts. This Is Good News
Lt. Gen. Keith Alexander told a packed security audience here at the RSA Conference 2009 that the National Security Agency wants to help support the nation's critical IT security infrastructure efforts as part of a "team" effort. And that the NSA isn't interesting in the job of running the security of the critical IT security infrastructure.
Analyzing Security Psychology
The integration of psychology into the security strategic-thinking process is critical for the advancement of information security. The human element influences all security controls because all of these controls seek to regulate human behavior.
Disappointed In Thin?
In a recent review of Symantec's 2009 Stop Buying Storage Survey, an odd result on thin provisioning might get overlooked. 42% of users are essentially disappointed in their thin provisioning investment, and another 37% only indicated seeing moderate improvement. If you aren't in the small group that saw significant improvement, you may have invested in the wrong thin provisioning technology.