security: Storage security

Security ROI: 5 Practices Analyzed
Which security practices bring the best return on investment? Not all of the most popular practices are good for your company.

One Way To Avoid Cloud Outages
Don't take chances with data availability. An onramping solution can help keep your customers--and your IT staff--happy.

Bromium Brings Hypervisor Security To Applications
Startup aims to beef up performance and security in the data center by bringing virtualization to the next level--the application level.
Whose Job Is Virtualization Security?
The adage "When everyone's in charge, no one's in charge" applies all too well to private cloudified networks.

How to Choose A Cloud Storage Provider: Security
In the first of a three-part series, we outline security considerations in selecting a place to store your data in the cloud.

Wake-Up Call For Cloud Vendors And Customers
Amazon and Sony's recent problems highlight the vulnerability of doing business in the cloud but may end up helping improve cloud services.

Global CIO: The Dropbox Deception: Caveat Emptor
Anyone who entrusted sensitive data to Dropbox without code review, or at least skepticism regarding impressive security claims, wasn't behaving...

Forget Tape Vs. Disk, Use Them Together
Tape is ideal for third tier backup data and the cost per GB, performance, and reliability make it an ideal compliment to disk backup.

Getting Real About SSD Performance
Solid state storage has moved beyond the learning stage and storage managers are trying to decide how to best use the new technology.

Schwartz On Security: Security Complexity Challenge No. 1
Still, organizations are loathe to cut vendors, fearing higher prices, greater total cost of ownership, and fewer capabilities.
Top Stories
-
Security ROI: 5 Practices Analyzed
June 19, 2013Which security practices bring the best return on investment? Not all of the most popular practices are good for your company.
-
Thumb Drive Security: Snowden 1, NSA 0
June 14, 2013Thumb drives helped NSA whistle-blower Edward Snowden transport top-secret data from the agency. If the NSA can't keep a lid on thumb drives, can you?
-
LinkedIn, Evernote Add Two-Factor Authentication
June 04, 2013Will LinkedIn and Evernote improve upon Apple and Twitter two-factor security systems, which have been widely criticized?
-
Dropbox Adopts Single Sign-On Technology
May 22, 2013Dropbox says any off-the-shelf or homegrown identity management system that's compatible with the Security Assertion Markup Language (SAML)...
-
British Cloud Firm Wins Background Check Security Contract
May 20, 2013Skyscape Cloud Services will partner with Indian consulting group Tata to provide security for U.K.'s new online criminal background check system.
-
How Password Strength Meters Can Improve Security
May 20, 2013Color-coded password-strength meters nudge users to improve the strength of their important passwords, but have little effect on unimportant ones,...
-
Sweet Password Security Strategy: Honeywords
May 07, 2013To improve detection of database breaches, businesses should store multiple fake passwords and monitor attempts to use them, according to...
-
Consumers Concerned About Online Data Privacy
April 19, 2013Companies that collect personal data must reassure citizens or risk serious backlash, warns Market Research Society.
-
Security Spending For Data Centers Increases
April 19, 2013Organizations that run their own data centers will spend an average of $17 million on security products this year -- an increase of more than $2...
-
Beware Smartphone Lurkers: Cloud Storage File Remnants
March 20, 2013Security investigators recovered Box, Dropbox and SugarSync files and unique file IDs, via forensic dump of iPhone and Android smartphone memory.
More
News »
Slideshows
Resource Links
Top Story
Europe Weighs New Data Breach Rules For Critical Companies

Mobile networks, banks, energy companies and other critical infrastructure providers could be required to report all breaches to EU authorities.
More News
Related Webcasts
- Smarter Mobile Security: Securing BYOD
- Smarter Mobile Security: Minding the Gaps
- DDoS Attacks: 2013 Industry Report On Attacks Released
- Extreme File Sharing: Three Secrets to Staying in Control of Your Large, High Value Assets
- Redesigning Backup and Recovery for Continuity and Efficiency in Virtualized Infrastructures
This Week's Issue
Free Print Subscription
SubscribeCurrent Government Issue
- Anytime, Anywhere: Mobile applications are the new way to extend government information and services to on-the-go citizens and employees.
- Big Changes For U.S. Intelligence: New initiative aims to shift the 17-member Intelligence Community from agency-specific IT silos to an enterprise environment of shared systems and services.
- Read the Current Issue