Security Corner:



July 29, 2009  9:08 PM

I’ll Say it Again—Turn Off the Remote Web Management Interface!

Posted by: Ken Harthun
Embedded systems, Exploits, Firewalls, Hacking, insecure, Remote Code Execution, Security, Security management, Storage, Vulnerabilities

I don’t know how many times I’ve told people that the embedded management interface on most devices is a security breach waiting to happen. I just got wind of some news, but can’t seem to find anything more than this mention. As soon as I dig up some details, I’ll let you know. This...

November 21, 2008  2:02 AM

How to Quickly & Securely Erase a Hard Drive

Posted by: Ken Harthun
Data destruction, Data sanitization, Security, Storage

Over at Ask the Geek, I often receive questions about how to properly erase a PC hard drive so personal data can't be recovered. Clients also ask similar questions, particularly those involved in medical, dental, or financial practices....

July 5, 2008  2:43 PM

The #1 Security Priority: Protect The Information

Posted by: Ken Harthun
Embedded systems, Encryption, Firmware security, Networking, Opinion, Security, Security management, Storage, Vulnerabilities

SANS recently reported that a Ponemon Institute survey, commissioned by Dell,...

March 24, 2008  9:06 PM

Encrypt, You Must, But Do It Right!

Posted by: Ken Harthun
Cryptography, Data destruction, Encryption, Security, Storage

EncryptionOne of the clients I service has information that falls under HIPAA. Prior to last week, all of the data was stored on a server located behind a strong firewall in a building with good...


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: