testing pos...
Recent News
Iron Mountain exits part of the cloud
Over on the post “Iron Mountain exits part of the cloud” contains this text: “ron Mountain exits part of the cloud Storage Alert By Deni Connor, Network World April 18, 2011 12:03 AM ET Going on two years in the cloud storage business, Iron Mountain will shutter its Virtual File Store and Archive Service platform […]
Oracle to fix 73 security bugs next week | Security – InfoWorld
Over on the post “Oracle to fix 73 security bugs next week | Security – InfoWorld” contains this text: “Oracle to fix 73 security bugs next week But Java SE and Java for Business are not set to be updated By Robert McMillan | IDG News Service Print|Add a comment Oracle plans to release a […]
The next step in data security: Toshiba drives wipe themselves | Hard drives – InfoWorld
Over on the post “The next step in data security: Toshiba drives wipe themselves | Hard drives – InfoWorld” contains this text: “The next step in data security: Toshiba drives wipe themselves Self-encrypting drives can detect when they are connected to the wrong host and automatically erase sensitive data By Leon Erlanger | InfoWorld How […]
Companies fear cybercrime more than insider threats | Security – CNET News
Over on the post “Companies fear cybercrime more than insider threats | Security – CNET News” contains this text: “Companies fear cybercrime more than insider threats by Lance Whitney External attacks from cybercriminals will soon pose a greater risk to the corporate world than insider threats, according to the results of a Cyber-Ark survey (PDF) […]
‘Spear phisher’ proves why you should be skeptical of LinkedIn updates > Social Networking > Vulnerabilities & Exploits > News > SC Magazine Australia/NZ
Over on the post “‘Spear phisher’ proves why you should be skeptical of LinkedIn updates > Social Networking > Vulnerabilities & Exploits > News > SC Magazine Australia/NZ” contains this text: “Spear phisher’ proves why you should be skeptical of LinkedIn updates Bugat trojan delivered in LinkedIn spam By SC Staff Apr 15, […]
Barracuda hack shows importance of defence-in-depth > Data Security, Database Security, File/Disk Encryption, Mobile Encryption, Storage Security > Network Access > Access Control > News > SC Magazine Australia/NZ
Over on the post “Barracuda hack shows importance of defence-in-depth > Data Security, Database Security, File/Disk Encryption, Mobile Encryption, Storage Security > Network Access > Access Control > News > SC Magazine Australia/NZ” contains this text: “Barracuda hack shows importance of defence-in-depth By Angela Moscaritolo Apr 15, 2011 9:53 AM Tags: Barracuda | pwnage | […]
Cloud users remain worried by security, lock-in > Data Security, Database Security, File/Disk Encryption, Mobile Encryption, Storage Security > Network Access > Access Control > News > SC Magazine Australia/NZ
Over on the post “Cloud users remain worried by security, lock-in > Data Security, Database Security, File/Disk Encryption, Mobile Encryption, Storage Security > Network Access > Access Control > News > SC Magazine Australia/NZ” contains this text: “Cloud users remain worried by security, lock-in By Dan Hatch Apr 15, 2011 9:39 AM Tags: Cloud | […]
Apple patches Pwn2Own, Comodo hack bugs – Computerworld
Over on the post “Apple patches Pwn2Own, Comodo hack bugs – Computerworld” contains this text: “Apple patches Pwn2Own, Comodo hack bugs Updates iOS and Mac OS X to plug holes in iPhone, iPad, Safari, Mac OS X, iPod Touch By Gregg Keizer April 14, 2011 04:10 PM ETComments (0)Recommended (7)”
Schneier on Security: Changing Incentives Creates Security Risks
Over on the post “Schneier on Security: Changing Incentives Creates Security Risks” contains this text: “hanging Incentives Creates Security Risks One of the things I am writing about in my new book is how security equilibriums change. They often change because of technology, but they sometimes change because of incentives. An interesting example of this […]
Hackers get ‘more violent’ against security firms > Data Security, Database Security, File/Disk Encryption, Mobile Encryption, Storage Security > Network Access > Access Control > News > SC Magazine Australia/NZ
Over on the post “Hackers get ‘more violent’ against security firms > Data Security, Database Security, File/Disk Encryption, Mobile Encryption, Storage Security > Network Access > Access Control > News > SC Magazine Australia/NZ” contains this text: “Hackers get ‘more violent’ against security firms RELATED ARTICLES RSA breach leaves customers waiting for answers WordPress.com servers […]