A data breach at Zappos.com that exposed information about more than 24 million customers has led to a lawsuit, filed in Kentucky, against the company and its parent, Amazon.com, charging that the company was entrusted with "safeguarding plaintiff's and class members' PCAI [personal customer account information]." It claims the companies are in violation of the Fair Credit Reporting Act. No credit card account numbers were exposed, according to the company.
More
Posted by Jim Powell0 comments
Security administrators know that external threats are just one of the vulnerabilities they must control. However, internal sources (read: employees) are often a bigger threat.
There's no greater evidence than the growing, unauthorized use of free consumer applications in the enterprise. Employees frustrated by limited IT budgets and lengthy project queues for simple functionality are turning to free consumer applications, especially for document storage. 'This poses a security red flag like no other.
More
Posted by Jim Powell0 comments
Thinking about replacing your tape library with a de-duplicating virtual tape appliance? It seems to be a pretty trendy idea, but not necessarily well-understood in terms of its potential consequences or outcomes. This video explores the arguments for and against the decision – in what we hope you will find to be an entertaining format. It is a mash-up of tech speak, Star Wars, and the Annoying Orange (ask your kids about that one).
More
Posted by Jon William Toigo0 comments
IBM Corp.’s recent acquisition of Green Hat Software Ltd. seems like a head-scratcher on a couple of levels, starting with the comparative obscurity of the acquisition -- Green Hat, a UK-based purveyor of software testing tools.
More
Posted by Stephen Swoyer0 comments
We all know that Bring Your Own Device (BYOD) is going to be a hot topic this year. Sure, mobile can increase the effectiveness of workers and give them access to data anywhere at any time. The question is -- how big is this trend and how is it affecting security administrators?
More
Posted by Jim Powell0 comments
Venafi, an enterprise key and certificate management solutions provider, released more results from its InfoSecurity 2011 survey recently. The study found that more than 500 IT professionals reported that CEOs “often lack access to their own sensitive data.”
More
Posted by Jim Powell0 comments
Not all cloud storage providers (CSPs) are created equal. That’s the unmistakable conclusion of a 26-month stress test of 16 major providers in which only six could meet the test’s minimum performance, stability, availability, and scalability requirements. The six included (alphabetically) Amazon S3, AT&T Synatpic Storage as a Service (powered by EMC ATMOS), Microsoft Azure, Nirvanix, Peer1 Hosting (also powered by EMC ATMOS), and Rackspace Cloud.
More
0 comments