Blog Posts Tagged with "Storage"


Protecting Our Data

July 04, 2011 Added by:Michael Fisher

Do you provide unmonitored access to your data and IP? What is really at stake here? Can we afford the status Quo when it comes to security? Is this a rarity or an everyday occurrence? So many questions, so few answers. Intellectual Property needs to be protected like a new born baby...

Comments  (8)


Hey You, Get Off of the iCloud

June 28, 2011 Added by:Kelly Colgan

Recent cloud-based data breaches have solidified the notion of cloud-insecurity in the consumers' mind. My concern with the iCloud is that Apple, which has mastered the art of slick marketing, could make the American consumer a whole lot less skeptical, and a whole lot less secure...

Comments  (0)


Dropbox Confirms Password Security Glitch

June 21, 2011 Added by:Headlines

"This should never have happened. We are scrutinizing our controls and we will be implementing additional safeguards to prevent this from happening again. We are sorry for this and regardless of how many people were ultimately affected, any exposure at all is unacceptable to us..."

Comments  (1)


Cloud Computing, Security, and You

June 16, 2011 Added by:Global Knowledge

There are many benefits of cloud computing, yet cloud computing also brings significant security concerns when moving critical applications and sensitive data to public and shared cloud environments. Here are five things to keep in mind when considering cloud based services...

Comments  (0)


FIPS 140-2: Just Buzzword Bingo?

June 15, 2011 Added by:Jonathan Lampe

If your IT department intersects with the finance, health care, government or energy sectors, or is subject to regulations such as PCI-DSS, then you should be using FIPS 140-2 validated cryptography now to protect data-in-transit and data-at-rest...

Comments  (4)


Evaluating the Cloud-Based Services Option

June 06, 2011 Added by:Mike Meikle

Keep a local copy of your data. If Google Apps one day decides to die because of “data corruption” you do not want to be stuck without access to important documents. The potential for an incident like this is moderately high since Google has already had a similar situation with Gmail...

Comments  (3)


One in Three Employees Admit Taking Risks with Data

June 03, 2011 Added by:Headlines

"Businesses can make the mistake of viewing data security as an on-site issue. Often the risks can lie with physical loss or with personal computers. Firms should identify how their staff transfer and handle business documents outside of the work-place, and minimize the risks..."

Comments  (0)


On Data Retention – When Not to Backup Data

May 24, 2011 Added by:Danny Lieberman

How much damage would be incurred if there was breach? For the purpose of asset valuation, we distinguish between customer data without PII and customer data that may have PII. Let’s consider 4 key assets of a company that designs and manufactures widgets and sells them over the Internet...

Comments  (0)


File Sharing or Privacy Breaching Service? Beware!

May 22, 2011 Added by:Ron Lepofsky

Researchers investigated the privacy of 100 file hosting services and discovered that a large percentage of them generate download uniform resource identifier (URI) in an insecure manner, which jeopardizes the confidential and privacy of user data...

Comments  (1)


Dropbox Responds to FTC Complaint about Data Security

May 18, 2011 Added by:Headlines

"We understand that many of you have been confused by this situation — and some folks even felt like we misled them, or were careless about their privacy. We apologize for this confusion. All of us here at Dropbox care deeply about the security and privacy of your data..."

Comments  (0)


FTC Complaint: Dropbox Lied About Data Security

May 16, 2011 Added by:Headlines

"Dropbox does not employ industry best practices regarding the use of encryption technology. Specifically, Dropbox’s employees have the ability to access its customers’ unencrypted files. Dropbox has and continues to make deceptive statements to consumers..."

Comments  (0)


ERP Vulnerabilities Differ from Those at the Database Level

May 13, 2011 Added by:Alexander Rothacker

ERP applications are attractive targets because this software is present in all major organizations and across the whole enterprise. The backend database of these systems usually contains customer data and key company secrets, such as the logic for business processes...

Comments  (0)


Eleven Questions to Ask When Buying a Secure Flash Drive

May 03, 2011 Added by:Emmett Jorgensen

USB flash drives are far too beneficial to be banned outright and avoided. Used with the correct combination of security features, they are a major asset to most organizations, providing a portable platform for storage and applications needed in today's corporate IT environments...

Comments  (0)


The Amazon Outage is OK? Well, Kind Of...

May 02, 2011 Added by:Ben Kepes

Cloud vendors are quick to point out how reliable their data centers are with redundant communication channels, power supply structures and the like. Any application running on the clouds needs to consider the same issues – it is unrealistic to rely completely on one single data center...

Comments  (0)


Data Security Ramifications of E-Waste

April 28, 2011 Added by:Allan Pratt, MBA

What are the data security and compliance implications if you have all of your confidential data on your computer hard drive or laptop? What if you are a policeman, school teacher, or lawyer – and the contact list on your phone includes information you are legally bound to not share?

Comments  (0)


Can You Have Privacy on Public Cloud Storage?

April 26, 2011 Added by:Eli Talmor

While the benefits of using a public cloud infrastructure are clear, it introduces significant security and privacy risks. In fact, it seems that the biggest hurdle to the adoption of cloud storage (and cloud computing in general) is concern over the confidentiality and integrity of data...

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »