Featured News Posts

Recent News

Iron Mountain exits part of the cloud

Over on the post “Iron Mountain exits part of the cloud” contains this text: “ron Mountain exits part of the cloud Storage Alert By Deni Connor, Network World April 18, 2011 12:03 AM ET Going on two years in the cloud storage business, Iron Mountain will shutter its Virtual File Store and Archive Service platform […]

Continue Reading →

Oracle to fix 73 security bugs next week | Security – InfoWorld

Over on the post “Oracle to fix 73 security bugs next week | Security – InfoWorld” contains this text: “Oracle to fix 73 security bugs next week But Java SE and Java for Business are not set to be updated By Robert McMillan | IDG News Service Print|Add a comment Oracle plans to release a […]

Continue Reading →

The next step in data security: Toshiba drives wipe themselves | Hard drives – InfoWorld

Over on the post “The next step in data security: Toshiba drives wipe themselves | Hard drives – InfoWorld” contains this text: “The next step in data security: Toshiba drives wipe themselves Self-encrypting drives can detect when they are connected to the wrong host and automatically erase sensitive data By Leon Erlanger | InfoWorld How […]

Continue Reading →

Companies fear cybercrime more than insider threats | Security – CNET News

Over on the post “Companies fear cybercrime more than insider threats | Security – CNET News” contains this text: “Companies fear cybercrime more than insider threats by Lance Whitney External attacks from cybercriminals will soon pose a greater risk to the corporate world than insider threats, according to the results of a Cyber-Ark survey (PDF) […]

Continue Reading →

‘Spear phisher’ proves why you should be skeptical of LinkedIn updates > Social Networking > Vulnerabilities & Exploits > News > SC Magazine Australia/NZ

  Over on the post “‘Spear phisher’ proves why you should be skeptical of LinkedIn updates > Social Networking > Vulnerabilities & Exploits > News > SC Magazine Australia/NZ” contains this text: “Spear phisher’ proves why you should be skeptical of LinkedIn updates   Bugat trojan delivered in LinkedIn spam By SC Staff Apr 15, […]

Continue Reading →

Barracuda hack shows importance of defence-in-depth > Data Security, Database Security, File/Disk Encryption, Mobile Encryption, Storage Security > Network Access > Access Control > News > SC Magazine Australia/NZ

Over on the post “Barracuda hack shows importance of defence-in-depth > Data Security, Database Security, File/Disk Encryption, Mobile Encryption, Storage Security > Network Access > Access Control > News > SC Magazine Australia/NZ” contains this text: “Barracuda hack shows importance of defence-in-depth By Angela Moscaritolo Apr 15, 2011 9:53 AM Tags: Barracuda | pwnage | […]

Continue Reading →

Cloud users remain worried by security, lock-in > Data Security, Database Security, File/Disk Encryption, Mobile Encryption, Storage Security > Network Access > Access Control > News > SC Magazine Australia/NZ

Over on the post “Cloud users remain worried by security, lock-in > Data Security, Database Security, File/Disk Encryption, Mobile Encryption, Storage Security > Network Access > Access Control > News > SC Magazine Australia/NZ” contains this text: “Cloud users remain worried by security, lock-in By Dan Hatch Apr 15, 2011 9:39 AM Tags: Cloud | […]

Continue Reading →

Apple patches Pwn2Own, Comodo hack bugs – Computerworld

Over on the post “Apple patches Pwn2Own, Comodo hack bugs – Computerworld” contains this text: “Apple patches Pwn2Own, Comodo hack bugs Updates iOS and Mac OS X to plug holes in iPhone, iPad, Safari, Mac OS X, iPod Touch By Gregg Keizer April 14, 2011 04:10 PM ETComments (0)Recommended (7)”

Continue Reading →

Schneier on Security: Changing Incentives Creates Security Risks

Over on the post “Schneier on Security: Changing Incentives Creates Security Risks” contains this text: “hanging Incentives Creates Security Risks One of the things I am writing about in my new book is how security equilibriums change. They often change because of technology, but they sometimes change because of incentives. An interesting example of this […]

Continue Reading →

Hackers get ‘more violent’ against security firms > Data Security, Database Security, File/Disk Encryption, Mobile Encryption, Storage Security > Network Access > Access Control > News > SC Magazine Australia/NZ

Over on the post “Hackers get ‘more violent’ against security firms > Data Security, Database Security, File/Disk Encryption, Mobile Encryption, Storage Security > Network Access > Access Control > News > SC Magazine Australia/NZ” contains this text: “Hackers get ‘more violent’ against security firms RELATED ARTICLES RSA breach leaves customers waiting for answers WordPress.com servers […]

Continue Reading →