Blog Posts Tagged with "Hardware"

94ae16c30d35ee7345f3235dfb11113c

Rep. Frank Wolf: What’s with You and Huawei?

March 28, 2012 Added by:Joel Harding

What are you saying, Mr. Congressman? Are you saying there are backdoors built into the equipment? Are you saying there is malicious code embedded in the software? Are you saying there is spyware hardwired into the chips?

Comments  (2)

37d5f81e2277051bc17116221040d51c

Nearly Five Percent of All Smartphones Lost Every Year

March 20, 2012 Added by:Robert Siciliano

Based on the costly consequences of lost data assets, it makes sense to allocate the necessary resources to invest in anti-theft and data protection solutions in order to secure smartphones and the sensitive and confidential information they contain...

Comments  (0)

F29746c6cb299c1755e4087e6126a816

Twelve Security Best Practices for USB Drives

March 06, 2012 Added by:Kelly Colgan

Portable and mobile storage devices are significant players in most corporate offices. Ensuring proper protection with a best practices policy and strict enforcement offers significant risk reduction—and can prevent long nights on data breach investigations...

Comments  (1)

E313765e3bec84b2852c1c758f7244b6

Smart Grid Raises the Bar for Disaster Recovery

February 13, 2012 Added by:Brent Huston

Many of the organizations we have talked to simply have not begun the process of adjusting their risk assessments, disaster plans and the like for these types of operational requirements, even as smart grid devices begin to proliferate across the US and global infrastructures...

Comments  (0)

F29746c6cb299c1755e4087e6126a816

Twelve Security Best Practices for USB Drives

February 07, 2012 Added by:Kelly Colgan

Portable and mobile storage devices are significant players in most corporate offices. Ensuring proper protection with a best practices policy and strict enforcement offers significant risk reduction—and can prevent long nights on data breach investigations...

Comments  (1)

D13f77e036666dbd8f93bf5895f47703

Bluetooth Security: Be Wary

February 07, 2012 Added by:Theresa Payton

Many of us use and love Bluetooth technology. It’s easy to set up and convenient to use. But you might want to think twice about what you use it for because that easy connection for you can also be an easy connection for a cybercreep...

Comments  (4)

5e402abc3fedaf8927900f014ccc031f

Don't Forget About E-Waste During the Holidays

December 27, 2011 Added by:Allan Pratt, MBA

How much time have you spent deciding what to do with the outdated smartphones, tablets, televisions, and computers? Don’t throw them out with the regular garbage. Instead, consider the environment, but first, take security precautions...

Comments  (0)

8c4834b99847b9f7c9ee94b45df086f9

The State of Solid State

December 21, 2011 Added by:Emmett Jorgensen

Solid state disks are more reliable because SSDs do not contain any moving parts. There are no read heads, actuator arms or spinning platters that can break down in an SSD. SSDs can be moved around freely while in use and have a higher tolerance against shock and vibration than HDDs...

Comments  (1)

34f0cf280cbc950bcb75cabd189b7a8d

Modern Encryption – So Easy a Caveman Could Do It

December 19, 2011 Added by:Kanguru Solutions

Adding encryption is a relatively easy and cost effective way to secure your organizations data without adding significant cost or complexity. For organizations dealing with confidential information (healthcare, banking, government) it should be mandatory...

Comments  (0)

296634767383f056e82787fcb3b94864

Symantec Still Selling Huawei Equipment to the DoD

December 19, 2011 Added by:Jeffrey Carr

"In a letter to partners, North America channel chief Randy Cochran says the contract manufacturing relationship between Symantec and Huawei will remain unaffected, as will Symantec’s commitment to marketing and developing appliance-based solutions..."

Comments  (3)

B64e021126c832bb29ec9fa988155eaf

HP Printer Hack Video Shows Sensitive Data Tweet Too

December 05, 2011 Added by:Dan Dieterle

The researchers showed how a maliciously formed print job could cause an HP printer’s firmware to be reprogrammed so it acts like a copy machine – sending an exact print job to any place in the world, and the attackers also get a tweet showing sensitive information parsed from the print job...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Millions of Printers Vulnerable to Hacking Attacks

November 29, 2011 Added by:Headlines

“How many of those printers are out there?’ It could be much more than 100 million... It may ultimately lead to telling everyone they just have to throw their printers out and start over. Fixing this is going to require a very coordinated effort by the industry..."

Comments  (0)

37d5f81e2277051bc17116221040d51c

What Are Your Digital Assets Worth?

October 21, 2011 Added by:Robert Siciliano

According to Consumer Reports, malware destroyed 1.3 million personal computers and cost consumers $2.3 billion in the last year. With the increased popularity of tablets, smartphones, and Macs, threats are becoming both more common and more complex for non-PC devices...

Comments  (0)

1156f97fa8f23821bd838fe7d9283d90

Multi-Function Printers and Security Beyond Compliance

October 20, 2011 Added by:David Sopata

Compliance in many cases is one of the biggest drivers for security. Compliance may not exactly require you to secure your Multi-Function printers or other devices, but since most organization generally want to do the right thing, it may be required to go beyond compliance...

Comments  (1)

8c4834b99847b9f7c9ee94b45df086f9

The Next Generation of Non-Volatile Memory

October 12, 2011 Added by:Emmett Jorgensen

When will manufacturers stop using Flash as the primary storage? Consider that in 2002 many experts assumed that Flash cells would not be stable when scaled past 45nm and predicted that it would need to be replaced by 2010. We know now that those predictions proved to be false...

Comments  (4)

34f0cf280cbc950bcb75cabd189b7a8d

Securing Flash Drives within the Enterprise

September 29, 2011 Added by:Kanguru Solutions

Flash drives have revolutionized the business world with their convenience and portability. However, for infosec professionals, flash drives are a dual edged sword. If lost or stolen, a single unencrypted flash drive has the potential to cause a costly data breach...

Comments  (1)

Page « < 1 - 2 - 3 > »