Enterprise IT Watch Blog:


June 30, 2010  9:39 PM

Gartner session reminder of just how vulnerable mobile storage can be

Posted by: Kevin Beaver
Kevin Beaver, Mobile Computing in 2010, Mobile Encryption, Security, Storage in 2010

June 23, 2010  1:34 PM

OUTBREAK: Man infected with computer virus

Posted by: MelanieYarbrough

Every silver lining has to have a cloud attached to it, and a

June 17, 2010  12:22 PM

The ultimate solution for securing laptop storage?

Posted by: Kevin Beaver
laptop security, Security, Storage in 2010, storage security

In preparation for my session at the upcoming Gartner Security Conference, I've been reviewing

Bookmark and Share     0 Comments     RSS Feed     Email a friend

June 15, 2010  6:01 AM

Storage Decisions 2010: Storage Insecurities Ride On

Posted by: Kevin Beaver
Security, Storage in 2010, storage security

As TechTarget's Storage Decisions conference wrapped up today, I was perusing the conference site and noticed something peculiar about the sessions. There are sessions on backup. There are sessions on...

June 9, 2010  7:00 AM

Moment of Truth: Storage and Business Risk

Posted by: Kevin Beaver
mobile security, Security, Storage in 2010, storage security

When you hear the word "storage," what typically comes to mind? Likely NAS, SANs, DAS, data centers and so on, right? Well, there's another component to storage that tends to get overlooked...at least in the context of oversight, security, and compliance. That is: mobile storage. From smartphones...

June 8, 2010  7:00 AM

Who needs storage security anyway?

Posted by: Kevin Beaver
Security, Storage in 2010, storage security

I'm in the middle of writing a whitepaper on data protection for CSOs, and it occurred to me just how often storage systems are overlooked in security testing. The typical security assessment involves servers, workstations, mobile devices, databases, Web applications, WiFi, and network...

June 3, 2010  9:21 AM

Breaking Up Is Hard to Do, Unless You’re Google

Posted by: MelanieYarbrough
Google, Microsoft, Security

Bookmark and Share     0 Comments     RSS Feed     Email a friend

May 25, 2010  3:05 PM

Don’t Take Candy from Strangers, or IBM

Posted by: MelanieYarbrough
IBM, Security, Storage in 2010, USB Malware

We at the IT Watch Blog appreciate irony as...

May 18, 2010  2:30 PM

Virtualization as a security testing platform?

Posted by: Kevin Beaver
Security, virtualization, Virtualization in 2010

Virtualization has many obvious benefits, but the one that stands out to me is being able to use it for security vulnerability testing. One of the things that has frustrated me the most over the years is how security testing tools will junk up your system - especially Windows. Install enough...

May 11, 2010  10:16 AM

Photocopiers: The latest threat to data security?

Posted by: Michael Morisy
CBS, data leakage, Security

This came out in April, but I missed it until it came through over the NAISG  mailing list: CBS did a nice investigative piece on how much confidential, legally protected information was set free via unwiped copy machines, many of which keep copies of all the copies they've ever made, easily...

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: