Blog Posts Tagged with "Storage"

F29746c6cb299c1755e4087e6126a816

Twelve Security Best Practices for USB Drives

February 07, 2012 Added by:Kelly Colgan

Portable and mobile storage devices are significant players in most corporate offices. Ensuring proper protection with a best practices policy and strict enforcement offers significant risk reduction—and can prevent long nights on data breach investigations...

Comments  (1)

0a8cae998f9c51e3b3c0ccbaddf521aa

Data Loss Prevention Step 6: Encrypting Data at Rest

February 06, 2012 Added by:Rafal Los

Even if you did know where all your critical information is, you'd probably be powerless to control its sprawl. Let's face it, systems consume data and then become mobile - which is hardly something you can do anything about in a world where mobility is a key business driver...

Comments  (3)

4c1c5119b03285e3f64bd83a8f9dfeec

On Software Vendor Access to Customer Data

January 30, 2012 Added by:Ben Kepes

The issue is a massive one for the industry and in a back-channel discussions a number of people made comments regarding how much of a risk to the cloud industry service provider access to data is. One person went on to say that this perception is poison to sales growth...

Comments  (0)

3750d420f6c2a9844b529978894dc0be

It's Time to Evolve How We Protect Our Data

January 24, 2012 Added by:Josh Shaul

Advanced systems for protecting databases have been available for several years now, and have become mature and reliable technology. Databases can be locked down with secure configurations, strong access controls, and effective patch management strategies...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Data Loss Prevention Step 5: Disable Access to Cloud Storage Services

January 16, 2012 Added by:Rafal Los

This is part 5 in a series, and it's about pulling your data away from the clutches of the cloud. It's not all as crazy as that sounds though, because the cloud has real benefits, but it has to be approached with sanity rather than as the ostrich approaches the sandstorm...

Comments  (0)

4c1c5119b03285e3f64bd83a8f9dfeec

Data Center Complexity and Clarity Around Outages

December 28, 2011 Added by:Ben Kepes

Things like physical security, multiple redundant power and networks to incredibly complex networking and load balancing components – the modern data center is an incredibly complex beast. And yet they still suffer outages...

Comments  (0)

8c4834b99847b9f7c9ee94b45df086f9

The State of Solid State

December 21, 2011 Added by:Emmett Jorgensen

Solid state disks are more reliable because SSDs do not contain any moving parts. There are no read heads, actuator arms or spinning platters that can break down in an SSD. SSDs can be moved around freely while in use and have a higher tolerance against shock and vibration than HDDs...

Comments  (1)

3e35900ae6facc6c146a85c435c71d82

Digital Forensics for Legal Professionals

November 30, 2011 Added by:Ben Rothke

The book provides the reader with a high-level overview of all of the fundamental areas around digital forensics, from how the legal system works, selecting an expert witness, evidence, to storage media, records/logging, call records and more...

Comments  (0)

4c1c5119b03285e3f64bd83a8f9dfeec

Flawed Analysis: On Clouds “Playing Nice”

November 13, 2011 Added by:Ben Kepes

The report gives a higher rating to applications that have native integration, and kind of discounts the awesome work that third party integrators are doing to tie together application as somehow inferior. But the report then goes on to give one example of a native integration...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

NYSBA Releases E-Discovery Best Practices Guidelines

November 04, 2011 Added by:Headlines

The guidelines are organized in a systematic fashion covering topics applicable to electronically stored information before, during and after e-discovery has occurred and includes coverage of legal holds, adequate preservation, investigations, duty to preserve, inadvertent alteration...

Comments  (0)

8ab4e596af60cabbf46c7ecf016af0ad

Is Cloud Computing Secure?

October 26, 2011 Added by:Brittany Lyons

The future of data storage online is certainly cloud computing, as it provides instant access to data under a heavy load and redundant backups for when the inevitable fail should happen. The security measures that go into protecting this future will only become more stringent as time goes on...

Comments  (0)

21d6c9b1539821f5afbd3d8ce5d96380

The Economic Benefit of Cloud Computing

October 24, 2011 Added by:Kevin L. Jackson

In considering cloud computing for the Intelligence Community, security is an obvious concern. Classified information should always be processed in properly protected and certified IC private or community clouds. If a secure cloud model can be designed, economic savings can certainly be realized...

Comments  (0)

8c4834b99847b9f7c9ee94b45df086f9

The Next Generation of Non-Volatile Memory

October 12, 2011 Added by:Emmett Jorgensen

When will manufacturers stop using Flash as the primary storage? Consider that in 2002 many experts assumed that Flash cells would not be stable when scaled past 45nm and predicted that it would need to be replaced by 2010. We know now that those predictions proved to be false...

Comments  (4)

07c90faf3632560a12dd6e98069813f2

Avoid Becoming a Security Statistic

October 12, 2011 Added by:Konrad Fellmann

Some organizations hoard data, but have no idea why. A business owner needs to figure out why the data needs to be kept, who will use the data, and how long it needs to be kept for business, legal or contractual reasons. Once defined, IT can implement proper controls to protect the data...

Comments  (0)

8c4834b99847b9f7c9ee94b45df086f9

Cloud versus Local Storage Security

September 22, 2011 Added by:Emmett Jorgensen

Each storage medium offers its own benefits for different scenarios. It's up to the user to choose the option that best fits. Security is a major difference in these two types of storage. Until cloud storage becomes more secure, many will prefer local storage alternatives...

Comments  (0)

44fa7dab2a22dc03b6a1de4a35b7834a

Who You Gonna Call When You Lose Data in the Cloud?

July 12, 2011 Added by:Bill Gerneglia

Cloud services enable customers to securely manage workloads, system and application downtime while reducing data loss. Placing huge amounts of data in the cloud creates the need for a business resilience strategy that will ensure continuous operation and create a competitive advantage...

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »