The Myth of Cloud Computing
Why the rapid spread of virtual technology is becoming a security risk.
Bill Brenner | 04 Dec | Read more
Why the rapid spread of virtual technology is becoming a security risk.
Bill Brenner | 04 Dec | Read more
As President-Elect Obama focuses on two wars and a hemorrhaging economy, security experts are urging him to address five weak security links in America's cyber infrastructure that threaten the nation's defenses and financial institutions.
Bill Brenner | 04 Dec | Read more
Chris Hoff, chief security architect for the systems and technology division at Unisys and an advisor on the Skybox Security customer advisory board, is one of the biggest critics of virtualization security out there. Not because it isn't important - but rather because it is vital and needs to mature rapidly.
Bill Brenner | 20 Nov | Read more
In a country that's seen many regulatory compliance challenges this decade, the headaches of PCI security tend to be analyzed from a largely American perspective.
Bill Brenner | 20 Nov | Read more
Proliferating mobile spyware? iPhone botnets? F-Secure's Mikko Hypponen and Andrew Storms from nCircle offer their projections on the next threats to mobile devices.
Bill Brenner | 13 Nov | Read more
A jewellery store chain is having much better luck catching burglars in real time, thanks to a little help from the IT side of the house. Loss Prevention Manager Dennis Thomas explains how the company built its high-tech command center from scratch.
Bill Brenner | 13 Nov | Read more
Robert Duran of Time and Allan Kintigh of National Card Services share their PCI auditing experiences. Why one's experience was unpleasant and the other fared better.
Bill Brenner | 06 Nov | Read more
Passed your first PCI compliance audit? You've only just begun! Veterans say ongoing challenges with log management, database encryption and upper management buy-in mean the task is never finished.
Bill Brenner | 06 Nov | Read more
Companies continue to leave too much of their security apparatus in the hands of geeks in the IT department and not enough in the hands of the wider workforce. Until that changes, enterprises will continue to have gaping holes in their data defenses.
Bill Brenner | 29 Oct | Read more
This is the third installment of a three-part series on the pros and cons of anonymous proxy services. Read the first installment here and listen to the second installment here.
Bill Brenner | 23 Oct | Read more
If there is truly a gray zone in the struggle between online good and evil, anonymous proxy servers live there.
Bill Brenner | 15 Oct | Read more
Ten years ago, Michael Riva was network administrator for a top-five American consultancy. Employees were downloading graphic pictures and videos onto the network. Riva told his boss a proxy server with content filtering might be in order; his boss laughed and suggested they put in a bigger file server instead.
Bill Brenner | 30 Sep | Read more
At first, this was going to be a column about the PR machine's hyperbolic efforts to connect the state of IT and security with the current financial crisis. Indeed, some have shamelessly sent me story pitches that try to get some bang out of the Wall Street meltdown.
Bill Brenner | 29 Sep | Read more
Computer networks in the academic world are a lot like the Wild West: It's hard to tell the good guys from the bad, and the sheriff's ability to maintain order is severely limited.
Bill Brenner | 16 Sep | Read more
Thanks to all the fear over data security breaches, a computer recycling operation has morphed into something much bigger - and potentially more lucrative - for the Saraiva brothers.
Bill Brenner | 11 Sep | Read more