Blog Posts Tagged with "Encryption"


Companies Combine Efforts to Secure Data on USBs

June 27, 2010 Added by:Robert Siciliano

Kingston Digital, Inc., the Flash memory affiliate of Kingston Technology Company, Inc., the independent world leader in memory products, today announced that it will partner with security company BlockMaster and provide greater availability of centrally managed USB drives, which makes it easier to protect information on-the-move.

Comments  (2)


Vector 2 Data Sanitizing

April 08, 2010 Added by:Mark Bennett

Ever wonder if the data on your hard drive is recoverable after a format? Thinking about throwing out that old hard disk you don't need anymore? Perhaps selling the computer on EBAY? You lost a USB stick at the supermarket, but you think you are ok because you deleted the data previously? THINK AGAIN!

Comments  (0)


It’s ‘Defense in Depth’, not ‘Dense in Depth’

December 18, 2009 Added by:Bill Wildprett, CISSP, CISA

I sit, dumbfounded with amazement after reading that insurgents in Iraq have been intercepting Predator drone video feeds and that the Pentagon has known about this for a year now.

Comments  (1)


Where are the DBAs?

October 07, 2009 Added by:Infosec Island Admin

What I really want to know is this: Where are the Database Admins (DBAs) these days? I cant tell you how many times in the past 18 months that I’ve found real enterprises running vulnerable databases with default passwords, weak passwords and no real permissions management.

Comments  (3)


Extremely Sensitive US Secrets Found on P2P Networks

July 29, 2009 Added by:Infosec Island Admin

According to an article released by the Washington Post today, private firm, Tiversa, Inc, discovered extremely sensitive information on global P2P Networks.

Comments  (0)


Not So Smart Grid?

July 14, 2009 Added by:Infosec Island Admin

According to a security researcher, the so-called Smart Grid technology being rolled out accross the country as part of the stimulus bill, may be vulnerable to numerous attacks. According to the researcher, many of the commands that allow the power company to interact with the smart-meters at the user's house (for example) do not require authentication, have no encryption and are ripe fo...

Comments  (3)

Page « < 10 - 11 - 12 - 13 - 14 > »