Cisco Won't Buy EMC, Will It?
Analyst Kaushik Roy with Choi and Pacific Growth Equities really stoked the fire of a longstanding rumor (repeat rumor) that Cisco would just love to buy storage king EMC. And while this won't happen, there are kernels of truth in there.
Radware Reveals Critical Vulnerability In Firefox 3
Well, not exactly "critical." But there is a flaw. And there is no patch. And so Radware demonstrates how many security vendors push their gear by spreading fear, uncertainty, and doubt on the user community.
The Reality Of Private Clouds
In his blog "Clouds Are Only in the Sky" yesterday, Richard Martin suggested that a cloud must be on the public Internet for it to truly be a cloud and that if something resembling a cloud is used internally then it must be utility computing. He makes a very good point; however, I respectfully disagree.
Apple And Security: Long Road Still Ahead
Apple's trying to pick up its game with iPhone security, recently listing an iPhone Security Engineer position. Assuming the job is really about helping users -- and not just thwarting pesky unlockers -- it's a good move, but some corporate inertia might need to be overcome before security is a true priority. Just take a look at the official iPhone Enterprise Deployment tools.
Modeling IT Attacks
Every day IT managers have to contend with an ever-changing risk environment. That's where good risk modeling can help.
Beating Up Storage Vendors
An analyst firm recently published a report suggesting that the No. 1 priority in reducing IT costs was to beat up your storage vendor for lower costs. I would like to give a dissenting opinion.
Vibrations Part II
In my last entry we opened up a can of worms around drive vibration, discussing what it is and how it occurs. Vibration exists, but why should you, the IT professional, care? This stuff is all on RAID 5, right? Why do you care if a drive fails?
DNS Woes: How Worried Should You Be? Pretty Dang Worried!
Yesterday's news that the first DNS attack strategies are circulating was no surprise: once a vulnerability -- large, small or in-between -- is discovered, the exploit code follows like rats nipping at the heels of the Pied Piper. The question is, how worried should you be about this particular vulnerability? Pretty worried, is my take.
Disclosure Isn't Working
After a decade of writing about IT security, I don't know how anyone would think this current system of disclose and patch is working. It's not.
DNS Flaw Attacks Coming: Patch Now!!!
The first attackware strategies based on the widespread DNS flaw announced earlier this month have been spotted. If you haven't patched yet, do it now, before it's too late. (Some say it's already too late.)
Good, Good, Good…Good Vibrations
Its summertime, time for a little Beach Boys? No, Good Vibrations is the beginning of a series of entries that I will be posting on increasing physical hard drive unit life. In recent briefings, manufacturers like Copan Systems and Xiotech have been raising the issue on the impact of drive vibration. While I was aware of drive vibration, it is not discussed much, so I decided to take a deeper dive.
Brocade Buys Foundry For $3B - Let The FCOE Battles Begin
After the close of trading yesterday, Brocade announced that it was going to buy Foundry Networks for $19.75 in cash and stock or a total of $3 billion dollars. This acquisition puts Brocade in a much better position in the coming data center network wars, as just being the dominant Fibre Channel switch vendor isn't worth much as large enterprise data centers move from separate storage and communications networks to a converged Ethernet.
Has The Time Arrived For iPhone Antivirus Software?
Apple antivirus and privacy software maker Intego thinks so. The security vendor last week announced its software is the first AV to scan the iPhone and iPod Touch for malware. I wouldn't rush out to install it, just yet.
Last night, Sunday, July 20, Amazon S3 went down for more than two hours. Last weekend, Apple struggled its way through its MobileMe transition and it is still having some issues with its iDisk service. Both of these companies provide a high quality cloud service, but scaling these types of technology for the masses isn't an easy task and as we have seen in the case of Apple, upgrades or transitio
There'll Always Be An England -- It Just Won't Have Any Secure Laptops
The news that more than 650 of the British Ministry of Defence's laptop computers have been stolen over the past four years, along with dozens of thumb drives over the last few months, all containing sensitive information, offers a startling reminder of just how mobile your mobile devices can unfortunately be.
iPhone Is Owned Again; Yawn
A little more than a week after Apple's shiny new iPhone 3G went on sale, a team of programmers say they've, once again, gained control over the highly coveted gadget.
Utilities Ready To Put IT Security Efforts In Place
The North American Electric Reliability Corp. (NERC) announced this week that it's improving its ability to better manage IT security and critical infrastructure protection efforts to North America's bulk power system.
The Problem With Power-Efficient Drives
Power-efficient drives are drives that slow down and go into a standby or idle mode and do exactly what they say they will do -- they save power. The challenge with these drives is that many manufacturers are putting these drives into standard array shelves, typically with the same power supplies and the same fans. The array shelf still has to be designed to assume that the drives will spin up at full power, because at some point they probably will.
State Of Spam: Illinois Tops Badmail Target List
A new study claims that Illinois receives more spam traffic than any other state in the union. But a close look at the data shows that the other 49 aren't doing all that well either (with one interesting exception.)
TrueCrypt: No Cloaking Crypto For You
Researchers say the steganography feature, also known as the Deniable File System (DFS), in TrueCrypt may not provide the "security by obscurity" users hoped for.
Power Rationing--Green Gets Serious
As part of my normal routine I try to speak with as many data center managers as possible. A trend has appeared lately that I believe we are on the front end of. I am calling the trend power rationing. We have been told several times now over the past few weeks that data center managers are being given a hard limit as to how much power they can use. This is a shift from the more common "Reduce power consumption by x%" to "You can use X watts of power."
Target's Swipe At Privacy, An Update
A representative from retailing company Target explained why they're scanning customers' driver's licenses, and exactly what information they are collecting.
Block-Level Tiered Storage
Tiered storage no longer has the hype surrounding it that it did a few years ago. The concept was simple -- move data from expensive Fibre drives to inexpensive SATA drives. SATA drive technology was just coming into its own and the price and modest capacity made it a good fit for the concept. As a result, every storage manufacturer on the planet was proposing a tiered storage strategy. There were seminars, Webinars, white papers (guilty as charged, I wrote more than a few of them), yet only a f
Why Isn't Internet Infrastructure Security A Bigger Issue?
The ongoing debate and discussion about the domain name server vulnerability disclosed last week may be getting a bit of traction in the world beyond IT, but the size and potential seriousness of the problem ought to raise other questions: Namely, why the security of the Net itself, as well as its users, doesn't loom larger (or at all) on the campaign trails.
Securing Your Wireless Internet Connection (You Know You Should)
Well, it's not really breaking news, security firm Kaspersky Lab is pointing out the obvious: that most home and small business wireless networks run at a low, or no, level of security. Kaspersky Lab also listed a handful of steps that could be taken to enhance your wireless security. And while it's all good advice, it left out one of the most important.
First Steps Into The Cloud
Storage will be one of the first steps many will make in using cloud services. In fact, many users have already taken that first step without even knowing it. They are using services like online storage, backup, and archive. Online backup is there, because of block-level incremental and data deduplication technologies; sending backup data over a network connection is not the impossibility that it was even a few years ago. Also, these companies have been in existence for quite some time, so there
New Media Trojan Exploits Bad Old Piracy, P2P Habits
A particularly aggressive new Trojan takes advantage of the oldest of vulnerabilities -- human nature. Hiding in pirate software sites, the Trojan infects the music and video files of illegal software seekers, then spreads when those files are peer-shared.
EMP Risk Follow-Up: Blather O'Plenty, No Action
As we discussed yesterday, it's been four years since Congress was fully briefed on our nation's vulnerability to an Electromagnetic Pulse (EMP) Attack, and the debilitating impact it would have on our electro-dependent society.
Justice Breyer's Data Exposure A Reminder Of P2P File Risks
The news that Supreme Court Justice Stephen Breyer's personal information was among thousands of other personal data files compromised as a result of a file-sharing snafu raises a couple of issues, chief among them whether or not peer-to-peer file sharing via public programs is ever appropriate for business info.
Cell Phone Security? Speak Up
Cell phone security? Try selling that to a bunch of kids in middle school, each with his or her own cell phone. To them, security is a word that means "don't let my parents know that I'm loaning you my cell phone so you can call your friend vacationing in Europe."
Server Hijack Problem Prompts Unified Industry Response
The show of patch-unity displayed by many of the industry's major players in addressing a domain name sever flaw is gratifying -- and annoying too. Nice to see them working together. Nicer if we knew more about the problem they're working to fix.