The Idiot Threat
It's been interesting to see how the failed bombing in New York's Times Square has been sifted for "lessons."
2010 Strategic Security Survey
We've weathered years of stagnant budgets. Could proof of a sophisticated network of attackers formidable enough to drive Google out of China finally open management's eyes to what it takes to protect data?
2010 Strategic Security Survey
We've weathered years of stagnant budgets. Could proof of a sophisticated network of attackers formidable enough to drive Google out of China finally open management's eyes to what it takes to protect data?
ID Management Where It Matters
Memorial Sloan-Kettering Cancer Center, the world's oldest and largest private cancer center, spent 18 months in the RFP process before it settled on Courion's Identity and Access Management offering as part of its governance, risk, and compliance strategy.
Cloud's Role In Backup, Part III
In this final entry on cloud based backup we will examine how enterprise backup systems can leverage the cloud. This involves the developer of the backup application to add cloud support directly to their application and providing an option to replicate or move backup jobs to an internet based storage repository. Essentially cloud storage becomes another target option to the application, similar to the
VaporStream Takes E-mail "Off The Record"
Not every e-mail needs to be part of the permanent record -- which is the point VaporStream is making with 256-bit encrypted "vanishing" e-mail service. Could be just what the doctor ordered for dealing with e-mail overload -- although more than a few divorce lawyers and tabloid headline writers might disagree.
Alert: Disposable Facebook Apps Installing Adware
Just like throwaway domains on the wider Internet, it seems like criminals now use throwaway applications on Facebook. They bring one app online to lure users and potentially infect them, and by the time one is taken down by Facebook, they create yet another.
'Twitterview' With Microsoft
I sometimes get a little long-winded when I pose a question to a source during an interview. But I undoubtedly will be pithy tomorrow when I conduct Dark Reading's first-ever "twitterview," or interview via Twitter, where I'll be strictly limited to 140 characters or less for a question.
DLP Gets An Open-Source Boost
Data loss, or leakage, prevention (a.k.a. DLP) is a product class that includes data discovery, classification, and monitoring to prevent your sensitive data from falling into the wrong hands. Some implementations are configured to alert instead of block, but the basics are the same. You have sensitive data, you don't always know where it is, so you use DLP tools to find it and keep it safe.
Cloud's Role In Backup, Part II
In our last entry we discussed how the backup process is a natural fit for the use of cloud storage and how the first model of cloud backup is being used. In this entry we will discuss the second of the other two cloud backup implementation methods, hybrid cloud storage and then tomorrow we will cover cloud enabled enterprise backup.
A Decade Ago, ILoveYou Worm Changed Security
It's been a decade to the week since the infamous "Love Bug "or ILoveYou virus hammered in-boxes around the world. While mass-mailer viruses of this type don't make headlines anymore, the ILoveYou virus forever changed the face of IT security.
75% Of SMBs Never Store Data Offsite: KineticD
The migration of storage to the cloud may be the first time many small and midsized business have adequately backed up data offsite, according to a new survey from cloud storage company KineticD.
New IM Worm Spreading Fast
Aggressive new variant of an older worm circulating around Yahoo Messenger lets attacker take over a victim's machine
China Missing From Top Spammers List
The majority of spam produced globally comes from the United States, followed by India and Brazil. China isn't in the top 15, says a Sophos report.
Cloud Storage's Role In Backup, Part I
One of the areas where most consumers, small businesses and even enterprises will first experience cloud storage is as part of the backup process. There are basically three options for cloud based backup and choosing the right one depends on the size and needs of your organization. Over the next two entries we will detail each of the methods.
Simple USB Flash-Drive Protection
Sneakernet-borne viruses seemed like a thing of the past until we started having Conficker outbreaks. There has been other malware that targeted USB storage devices before Conficker, but for some reason none had been as effective at spreading...something that's likely attributable to the multipronged attack capability.
|