Security Blog

Aug 31, 2010

Free Cloud-Based Storage/Security for Gulf Coast Customers

Do you live in a region on the Gulf or East Coast that is prone to getting hit by hurricanes? If so, have we got a deal for you. Nasuni, a company that specializes in cloud-based file storage, is offering a free 3-month trial (as opposed to the standard 14-day trial) to customers in a region at risk of being hit by a hurricane. Eligible customers/businesses must reside in one of the following states: Alabama, Florida, Georgia, Louisiana, Mississippi, North Carolina, South Carolina, or Texas. Nasuni's file storage solution is unlimited and available at a flat rate of $3,000/year. (To compare the cost to competing providers, visit the cost calculator on Nasuni's website.)  So what's the deal? Does Nasuni have a heightened sensitivity for hurricane survivors, an environmental conscience for the growing threats we've seen over the last decade? Not likely. I'd assume, rather, that the hurricane focus is a subtle way of saying that cloud-based storage, in addition to being a hands-off, set-and-forget option, provides added peace of mind against physical threats such as natural disasters.) To learn more about cloud-based storage and backup solutions, check out Should You Use a Hosted (Cloud) Backup Solution? Or, if you reside in one of the eligible states and would like to sign up for a 3-month free trial, call Nasuni at 508-651-0580, extension 3. Related Reading: Top 5 Considerations for Disaster-Recovery Planning Top 9 Storage Trends for 2010 Going Backup-less with Exchange 2010?...More
May 28, 2010

Biometric Security Done Right 2

When I wrote about current biometric security devices recently, I was a bit disappointed that the security on these devices wasn't that robust. (Actually, Fujitsu's PalmSecure sounds pretty sharp, so I shouldn't group that with the other technologies.) But shortly after that article was published, I was contacted by Stephen Nation with Nation Technologies, a small start-up that specializes in a biometric-based security product called BIOWRAP. Unlike a lot of the current biometric products, which offer convenience and a little bit of security (plus some added risk), BIOWRAP is all business when it comes to security. It offers two-factor authentication (username/password and fingerprint recognition), and it has an extensive verification process, which I'll get to. Finally, another advantage of BIOWRAP is that it offers one central management infrastructure for the biometric identity, versus having a bunch of separate biometric identities (which is just as confusing as today's username/password situation.)  "The biometrics market today is focused on biometrics simply as a matter of convenience. I mentioned facility control and access management—that's really a convenience. Yes you have an additional level of security and transparency, but it conveniently allows you to get access to the door, or log in to your PC, but outside that transaction there's no value to the biometrics. And I say that because it's typically a self-enrolled or admistrative-enrolled biometric, and outside that enterprise or PC there's no true value to it. And it requires every time you perform a transaction in a separate system, you have to do another enrollment. So we get back to this same model where you have 10 identities, or 10 biometric identities, that are all credentialed, as opposed to having a single source of identity," said Nation....More
May 25, 2010

Symantec Will Acquire VeriSign's Security Business

Symantec announced last week that the company is acquiring VeriSign’s identity and authentication business. The acquisition is slated for September 2010 and will cost Symantec approximately $1.28 billion....More
May 3, 2010

Preventing Security Holes from Social Networks

With Facebook announcing its instant personalization idea (a concept to let websites include widgets displaying what your Facebook friends think about topics related to the website content), yet another long, hard, look at security in our new web age seems in order. It's gotten to a point where security is so lax that it almost seems irrelevant, like a subconscious acceptance of open season for hackers and criminals from here on out. And expecting governments and corporations to create some form of "silver bullet" solution that will solve all our security problems is, well, unrealistic. No, the onus is on us to take this seriously. While many of us are fortunate enough to not have ever been a personal victim of identity theft or computer hacking, it's no excuse to wait until it's too late to get smart. I discussed security best practices with Robert Sugrue, managing director for Insite Security, a company that helps high-profile individuals (executives and government officials) protect themselves. Here are a few simple takeaways. ...More
Apr 23, 2010

McAfee's svchost.exe SNAFU

On Wednesday, millions of computers came to a dead halt when McAfee mistakenly identified a normal Windows update file (svchost.exe) as infected with the malware Wecorl.a, causing machines to either crash or enter an endless reboot cycle....More
Apr 12, 2010

Security Recommendations for Microsoft's .NET Framework 4.0

Coinciding with today’s release of the final version of Microsoft’s .NET Framework 4.0, V.i. Laboratories makes certain recommendations regarding the security of applications developed on the framework. V.i. Labs advises independent software vendors (ISVs) and application developers to ensure that they have security technology in place to prevent hackers, competitors, partners, and software pirates from accessing sensitive intellectual property (IP) embedded in the .NET code and tampering with deployed applications....More
Jan 27, 2010

Which Security Threats Put Your Organization Most at Risk? 2

Sophos identified 5 major IT security threats for 2009. How accurate was the company’s 2009 Security Threat Report? Which security threats put your organization most at risk?...More
What's Security Blog?

Security news, views, product reviews, and solutions for Microsoft Windows IT professionals.

Blog Archive

Sponsored Introduction Continue on to (or wait seconds) ×