F-Secure Survey Shows Misplaced Security Confidence
A new computer-use survey from security firm F-Secure shows that the majority of more than 1,000 respondents understands the importance of updating virus definitions. Yet less than 20 percent understood the need for frequent definition updates.
Stimulating Choices
OK, so you can't take yourself public like Visa. But how much thought have you given to that big, fat check coming your way in May? You know, the "Spend our way out of this nonrecession" check?
Stomping On Your Carbon Footprint
The "greening" of IT is very à la mode right now, especially in storage. But this umbrella term suffers from overuse, and near as I can tell, is a euphemism for using less electricity. It's also a "feature" that enables some vendors to bump up their prices. So what exactly is the fuss again?
From 'Energized' To Not So Interested
The little do-si-do between Congress and the White House over missing e-mails is apparently over. Cynics might predict the next steps will be a digging in of heels, followed quickly by threats to launch (and bungle) an investigation, or worse, appoint a special prosecutor.
An Ounce Of Virtual Prevention
Security researchers found/punched a new hole in one of VMware's products this week, and from some quarters, it's being written about as if virtual machinery had never been a target for malicious code before. Those in the data center know differently.
Cell Phone Device Detects Deleted Data
Cell phone users whose phones use SIM (Subscriber Identity Module) strips need to know that a new device that reads those strips can also retrieve deleted text messages. It's called, appropriately enough, Cell Phone Spy.
Challenges From The Vendor View
Vendors see the world of technical challenges a bit differently -- and no surprise here: The items they cite often tend to play to the vendor's strengths or ongoing market initiatives. But here are how big thinkers at some storage vendors view the biggest engineering challenges ahead.
A Bad Day at Pakistan Telecom
Sometimes I think I should have been a network engineer. I love all that "belly of the internet beast" stuff—giant high-speed routers, huge data pipes, and all things close to the backbone of the Internet. But then I remember my grades from my engineering classes, and why I dropped engineering, and switched my major to English. Perhaps the engineer who broke both YouTube and the Pakistani Internet yesterday should have switched his major, too, before it was too late. I mean, I
Up To The Challenge?
Mask complexity, improve performance, and automate every last function possible -- those, in a giant nutshell, are the biggest engineering challenges for storage in the next several years, according to some big thinkers who've deployed a SAN or two in their time.
Where Storage Gets Innovative
There are lots of good barometers out there -- the Dow Jones Industrial Average comes to mind, as does the Consumer Confidence Index. A little closer to home, this gauge of where VCs and angel investors are placing their bets tells you a lot about where storage is headed in the next 12 months.
Encrypted Disks At (Some) Risk To Eavesdroppers
Whether you are using Windows Vista BitLocker, Mac OS X FileVault, Linux-based dm-crypt, or open source disk encryption software TrueCrypt - your data could be at risk to snoops, researchers have found. While it is troubling news, all is not lost.
Learn To Hack -- Ethically!
Know your enemy means knowing how your enemy works. That's the philosophy behind McAfee's Foundstone Professional Services Ethical Hacking course. You, too, can learn how to find and exploit network vulnerabilities -- but only if you pledge to use the knowledge for good.
Big Challenges Ahead
Late last week, the National Academy of Engineering issued a list of the biggest technical challenges of the 21st century, some real thorny knots like reverse-engineer the human brain and prevent nuclear terrorism.
It got me wondering how the some of brightest minds in storage might answer the same question. So I asked them.
Microsoft Moves To Squash 'Friendly' Worm
Last week, NewScientist ran a story about Microsoft's researching how worms -- really, really effective worms -- could be used to disseminate software patches. Today, Microsoft seems to be backing away from the idea.
When Good Intentioned Users Do Harm
Minneapolis-based data recovery and forensic software maker Kroll Ontrack published a list of what the company estimates to be some of most common mistakes end users make when trying to save data from a failing drive.
Security And (Or) Regulatory Compliance
Anyone who knows me knows that I don't believe achieving regulatory compliance is a technology problem. Sure, good tech will help you get there. But at it's core, compliance is a processes problem. And a pet peeve of mine has been how the mad dash toward regulatory compliance has, in many organizations, forced CISOs to take their eye off of security.
Safety In Numbers
There's a great movie I hope they still show in math and science classes called something like "Powers of 10." It begins with a shot of an earthbound human, then zooms out 100 feet, then 10,000 feet, racking up the exponents til we're out in Carl Sagan country. It then reverses itself into the subatomic realm. It blew my 10-year old mind, such that when the discussion turns to
Valentine's Virus-Mail-- Anything But Romantic
Won't you be my Valentine? Won't you be my VirusTime is more like it, as a storm of malicious e-cards and messages breaks across the Net. Don't click on any unexpected e-cards or messages, however Cupid-cute -- and warn your employees not to, either.
Now, That's Service
Six weeks into the year and you're finally remembering that sinuous "8" when you write a new check. And it's been barely a week since the Year of the Rat celebrations ended. No matter -- in Storageville, it's pretty safe if we just go ahead and label this the Year of Storage Services.
Zero-Day Attacks Trend Down? I Don't Give A Flying Hoot
Security researchers and the press like to parse vulnerability trends. They like to argue (among themselves) as to whether zero-day attacks are on the rise, and if the underground is selling or sandbagging the security flaws these black hats uncover. I say: So what? None of this should matter to you.
Google Warns Of Search Fraud Surge
As search engines become the default starting point for many if not most Web activities, they're increasingly targeted by crooks. That's what Google's finding, and pretty grim findings they are.
The Changing Role Of The CISO?
Just a few years ago, the chief information security officer's focus was to defend business-technology systems from the continuous barrage of viruses, worms, denials-of-service, and many other types of attacks that placed system availability and information at risk. For many, I suspect, this role has changed dramatically.
Partners That Compete
I know cooperative competition is supposed to be a cornerstone of business today. Still, I have to wonder how much further down the path to recovery will Dell get before its primary storage partner EMC complains?
Microsoft Office, Internet Explorer At Greatest Risk
Microsoft unleashed 11 security bulletins today, as part of its monthly patch cycle. Six of the bulletins are rated by the software vendor as "Critical," and five are ranked as "Important." You'll want to patch yourself right away, but if you had to prioritize . . .
Apple Fixes Security Holes, Updates Leopard
Where last week finished up with having to patch my Firefox browser with two handfuls of security patches, Apple has released its first batch of security updates for this year. And it's a biggie.
Pleading The E-Fifth
It's probably not the career most storage professionals might have envisioned -- data forensic specialist, law enforcement agent, and archivist/go-fer. But with recent incidents that span from Detroit to Paris, here's why storage
Malware Getting Worse: 11 Trends To Watch
Half a million malwares (and then some) and counting -- that's McAfee Avert Labs' prediction for this year. That's a more than 50 percent jump over '07, and the scarier thing is that the prediction may be conservative.
Backup That's Off The Hook
"Unfortunately, it's a huge file and it's taking a long time," says a Verizon spokesman in this report about a database gone astray. Unfortunately, the file problem left 750,000 landline customers here in Southern California without any voice mail service for two days.
PCI Web Application Security Deadline Looms
If you're a Web merchant, you're (or had better be) familiar with the Payment Card Industry Data Security Standard, or PCI DSS. What you may not know is that this June some new rules apply.
Enough With The Patches Already!
I'm growing increasingly grateful for those quiet days when I can actually use my computer systems, for work or fun, rather than have to patch them. Is it really too much to ask?
Spam Across The Waters: Europe Grabs Junkmail Lead
This month's Symantec Spam Report brings some interesting -- and surprising -- information about the nature of the spam that clogs our queues and pipelines. Spam filesize is shrinking and more of it's coming from Europe than anywhere else.
Total Cost Of Lead Generation
I know at least four vendors who'd be more than willing to help you calculate it, but does anyone really know the total cost of ownership (TCO) of their storage? Too often, these calculations have about the same gravitas as when someone starts describing what they're worth "on paper."
Free Encryption For All
Sure, you can keep your files secure with BitLocker, available for certain versions of Vista. And Mac users have FileVault, which is free with Mac OS X. Personally, I like TrueCrypt. Here's why.
|