Security Corner:

Storage

1

July 29, 2009  9:08 PM

I’ll Say it Again—Turn Off the Remote Web Management Interface!



Posted by: Ken Harthun
Embedded systems, Exploits, Firewalls, Hacking, insecure, Remote Code Execution, Security, Security management, Storage, Vulnerabilities

I don’t know how many times I’ve told people that the embedded management interface on most devices is a security breach waiting to happen. I just got wind of some news, but can’t seem to find anything more than this mention. As soon as I dig up some details, I’ll let you know. This...

November 21, 2008  2:02 AM

How to Quickly & Securely Erase a Hard Drive



Posted by: Ken Harthun
Data destruction, Data sanitization, Security, Storage

Over at Ask the Geek, I often receive questions about how to properly erase a PC hard drive so personal data can't be recovered. Clients also ask similar questions, particularly those involved in medical, dental, or financial practices....


July 5, 2008  2:43 PM

The #1 Security Priority: Protect The Information



Posted by: Ken Harthun
Embedded systems, Encryption, Firmware security, Networking, Opinion, Security, Security management, Storage, Vulnerabilities

SANS recently reported that a Ponemon Institute survey, commissioned by Dell,...


March 24, 2008  9:06 PM

Encrypt, You Must, But Do It Right!



Posted by: Ken Harthun
Cryptography, Data destruction, Encryption, Security, Storage

EncryptionOne of the clients I service has information that falls under HIPAA. Prior to last week, all of the data was stored on a server located behind a strong firewall in a building with good...


1

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: