Malware Made Real
Romanian visual artist Alex Dragulescu has created a series of images depicting malware, under a commission from MessageLabs, a communications security company. The results are stunning because they sustain the expectation that malicious code is somehow alive.

Disaster Recovery: Practice = Protection
How prepared can you be for a data disaster? Clearly the answer is never enough -- no matter how prepared you are, the recovery will undoubtedly reveal aspects of your preparation that can be improved upon. So why not start scouting out those improvable aspects before disaster strikes? Why not practice for problems and rehearse your recovery? Doing so now might eliminate post-disaster disasters later.
Skepticism and Safety
Welcome to the Internet. Trust no one.
Living in my bubble of tech-savvy friends and acquaintances, it's easy for me to forget that people need to be told this. But then, I get an e-mail from a particular person (who shall remain nameless) warning me about a virus going around in the form of an e-mail attachment entitled "Life is Beautiful." Of course, it's a forward, and I can see the chain of suckers going back several generations. I'm admonished not to op
Demise Of The Specialist
Security's never been an afterthought in storage, but it wasn't exactly a major cornerstone as stored bytes moved beyond the mainframe and into storage networks. Lost or stolen hard drives, laptops, and backup tapes have made big headlines in recent years, and prompted state and federal lawmakers to horn in on the act.
A Taxing Response
"No effort to control greenhouse-gas emissions or to lower the carbon footprint ... can succeed unless those emissions are priced properly," writes Michael Specter in the Feb. 25 issue of The New Yorker. "There are several ways to do that: they can be taxed heavily, like cigarettes, or regulated, which is the way many countries have established mileage-per-gallon standards for automobiles." Exchanges where entities buy and sell rights to pollute are another way.
While Specter's article i
Microsoft Preps Bevy Of Office Patches
Microsoft is readying four "critical" security patches for next week. While it's a far cry from last month's 11 patches, IT shops will be busy nonetheless.
In Love With Wireless
And public Wi-Fi hotspots, texting galore, and the iPhone are the tools of this seduction. But with more applications and wireless spectrum (and YouTube clips) on the way, where exactly are we going to store all this new content?
Missing White House E-Mail -- Politics Or Bad Tech Policy?
The White House's assertion that as many as 5 million e-mails have gone missing has raised a lot of political hackles on both sides of the aisle and throughout the pundit-sphere over the last couple of years. Far less attention has been paid to a far more serious (and less politically secular) question: just what is the tech infrastructure underlying the White House's electronic communications?
Julienne Storage
Given the variety of ways that stored data gets sliced and diced these days, it's hard not to imagine that Ron Popeil of Veg-o-Matic fame didn't have a hand in there somewhere along the way. Here's what I mean.
Is This Really A Good Idea?
In a world concerned with terrorism, is providing the capability to monitor factory and plant information from a handheld device really a good idea?
SRM Gets The Gas
In Vendor Land, it's a short hop from capacity planning to storage resource management (SRM). A couple product guys from IBM volunteered to explain why this makes good business sense (even if it blows your budget).
Good News: Federal Agency IT Security Improving
Usually the government releases news it wants to bury over the weekend. This Saturday, however, the Office of Management and Budget released a report stating that, overall, federal IT security is improving.
A Bracketed Discussion
You know, the kind where you want to decide where to go for dinner, and suddenly your significant other/spouse/soulmate is off and running on the past, present, and future of the relationship and why you never ... well, you get the point.
This is actually good practice for when you try to talk to a vendor or reseller about storage capacity planning. Why? Because this very specific function you want help with snowballs quickly into a referendum on the future and sanctity of your enterprise's da
A Dozen Thumb Drives With Security Features
Thumb drives are convenient, cheap -- and all too easily lost, stolen, left behind or otherwise compromised... with potentially catastrophic consequences. Informationweek recently took a look at twelve drives that include security features.
Is That A Trojan Calling?
Numerous security researchers, including the US-CERT, are warning of a new Trojan that attempts to attack Microsoft Windows Mobile Devices. Is that threat anything to worry about?
|