security: Storage security
S.C. Security Blunders Show Why States Get Hacked
Governor blames data breach on Russian hackers and the IRS, but states' by-the-book IT ethos shows rules and regulations are the real culprit.
Royal Security Fail: 'May I Speak To Kate?'
The oldest -- and most effective -- social engineering trick in the book remains getting on the phone and impersonating an insider. Ask Kate...
Social Networks Continue Push For Control
The Internet was supposed to facilitate direct connections between individuals and disempower gatekeepers. Instead, it has become a massive...
Should LulzSec Suspect Face Life In Prison?
Computer hacking, identity theft, and fraudulent credit card charges could add up to 30 years to life for alleged Stratfor hacker Jeremy Hammond.
Facebook 'Privacy Notice' Has No Legs
But Facebook should be looking at why the notice went viral.
Petraeus Mission Impossible: Cloaking Email, Online Identities
So-called security experts making basic information security errors isn't a new occurrence. Arguably, it even led to the rise of the Anonymous...
The Petraeus Affair: Surveillance State Stopper?
Lawmakers, now reminded of their own vulnerability, need to strengthen email privacy protections. Companies need to do more to help customers...
5 Items Should Top Obama's Technology Agenda
From infrastructure to tech education, here's what I want to see on the to-do list for the next four years.
5 Emerging Enterprise Technologies
If you are not watching these developments, your business is missing out. Here's what Gartner's annual top 10 tech trends list missed.
Frankenstory: Attack Of The Iranian Cyber Warriors
Citing no hard evidence, U.S. government officials have been stoking fears that the Iranians are out to get us.
Security Newsletter Sign Up
Get timely, actionable insights tailored to the topics you are interested in.
Sign UpTop Stories
-
Hurricane Sandy Lesson: VM Migration Can Stop Outages
November 16, 2012When a hurricane or other disaster threatens, why not just move critical systems out of the way? It can be done -- but not at the last minute.
-
More VMware Source Code Leaks To Internet
November 06, 2012Does the second release -- in less than a year -- of stolen VMware ESX source code put users at risk?
-
Cisco Releases Cloud IPS, Upgrades Security Products
September 12, 2012Network equipment vendor's new products and services focus on improving security for mixed physical, virtual, and cloud environments, as well as BYOD.
-
Virtual Encryption Gateway Secures Web App Data
September 11, 2012CipherCloud's add-on gateway lets businesses control encryption to secure their own data in the cloud.
-
Laptop Fingerprint Readers Vulnerable To Password Hacks
August 30, 2012Security software included with UPEK fingerprint scanners stores Windows passwords in plaintext, making them retrievable by an attacker.
-
Dropbox Two-Factor Authentication Has Kinks, Users Say
August 27, 2012Cloud storage provider upgrades security after attacker stole data from Dropbox employee's account. But users say the beta version needs tweaks.
-
8 Ways To Avoid Getting Your Life Hacked
August 08, 2012How can you avoid an 'epic hack' involving your Apple iCloud account, as journalist Mat Honan just experienced? Follow these strategies.
-
Dropbox Admits Hack, Adds More Security Features
August 01, 2012Flood of email spam blamed on attacker grabbing an internal document containing users' email addresses.
-
Who Owns Your Big Data?
July 30, 2012Big data may be set to take off in the enterprise, but the laws protecting it have a long way to go.
-
One Way To Avoid Cloud Outages
July 23, 2012Don't take chances with data availability. An onramping solution can help keep your customers--and your IT staff--happy.
More
News »
Slideshows
Resource Links
Related Webcasts
- Is Your Network Ready for BYOD?
- Storage Encryption Options for Better Security
- How Barclays Built a File Transfer Service that's Easy, Secure and Cost-Effective
- Virtualize More While Improving Your Risk Posture – The 4 "Must Haves" of Virtualization Security
- Redesigning Backup and Recovery for Continuity and Efficiency in Virtualized Infrastructures
This Week's Issue
Free Print Subscription
SubscribeCurrent Government Issue
- Data Center Optimization: Federal agencies must increase server utilization and energy efficiency as they squeeze more computer processing into fewer data centers. We explore how the Army, Homeland Security, Veterans Affairs and others are doing that.
- Future Cities: The world's urban centers are growing, creating a civic management challenge of unprecedented scope and complexity. Our exclusive survey reveals the opportunities and challenges for city planners and municipal IT pros.
- Read the Current Issue












