Threats & Malware, Vulnerabilities
October 14, 2021
Via: Help Net SecurityContinuity issued a research report which provided an analysis of the vulnerabilities and misconfigurations of enterprise storage systems. The findings revealed that storage systems have a significantly weaker security posture than the other two layers of IT infrastructure: compute or […]
Cloud security, Vulnerabilities
July 17, 2019
Via: Threat PostResearchers are warning of a vulnerability in LenovoEMC storage hardware and legacy Iomega-branded network attached storage (NAS) appliances that could lead to a breach of data stored on the devices. The bug, disclosed Tuesday by Lenovo, is rated high-severity and […]
Data loss, Network security, Threats & Malware, Vulnerabilities
April 30, 2019
Via: Hot for SecuritySelling your old hard drive on eBay may sound like a good way to squeeze a few extra bucks from unused hardware, but not if you don’t erase the data properly. A combined team of data recovery experts from Blanco […]
November 29, 2018
Via: Help Net SecurityThe increased affordability and accessibility of data storage over recent years can be both a benefit and a challenge for businesses. While the ability to stockpile huge volumes and varieties of data can deliver previously unattainable intelligence and insight, it […]
February 16, 2018
Via: Security AffairsDell EMC addressed two critical vulnerabilities that affect the management interfaces for its VMAX enterprise storage systems. The Dell EMC’s VMAX Virtual Appliance (vApp) Manager is an essential component of a wide range of the enterprise storage systems. The first […]
February 15, 2018
Via: Threat PostDell EMC fixed two critical flaws in its management interfaces for its VMAX enterprise storage systems. One of the vulnerabilities could allow a remote attacker to use a hard-coded password to a default account to gain unauthorized access to systems. […]
October 11, 2017
Via: Security WeekConsulting and technology services giant Accenture inadvertently exposed potentially sensitive information by leaving it unprotected in four Amazon Web Services (AWS) S3 buckets. The cloud storage containers were discovered on September 17 by Chris Vickery of cyber resilience company UpGuard […]
Access control, Cloud security
May 22, 2017
Via: Help Net SecurityFor enterprises that use the cloud, the key to being protected starts with understanding the layers that make up the components of their cloud stack. These different layers create multiple potential targets, and for the informed, they each represent a […]
February 21, 2017
Via: Dark ReadingSDDC adoption is likely to trigger widespread data security governance programs, with 20 percent of organizations considering them necessary to prevent data breaches. With business moving toward “cloud first” implementations for obvious operational, performance, and scalability improvements, the concept of […]
October 25, 2016
Via: DataBreach TodayFederal regulators are reminding for-profit companies that if they collect and share consumer health information, they not only need to comply with HIPAA security and privacy regulations, but also the Federal Trade Commission Act. The new guidance from the FTC […]
August 25, 2016
Via: CSO OnlineAs big data initiatives gain steam at organizations, many companies are creating “data lakes” to provide a large number of users with access to the data they need. And as with almost every type of new IT initiative, this comes […]
May 13, 2016
Via: Dark ReadingOn-server storage and processing of biometric authentication presents a host of regulatory and corporate responsibility issues. It’s bad enough when an organization exposes huge repositories of customer records and login information through large-scale data breaches. But the ante for pain […]
August 26, 2015
Via: cloud-security#ibm is beefing up its offerings in software-defined #storage, which promises to let IT departments better deal with large amounts of storage by uncoupling the management software from its underlying hardware. The company has expanded two products in its #spectrum […]
August 18, 2015
Via: cloud-securityWith SDP, organizations can create an ‘invisible’ infrastructure that only authorized users and devices can access. Here’s why it’s time has come. In recent times the security industry has lamented the dissolution of the network perimeter. The era of strong […]
August 11, 2015
Via: mobile-securityPressing a finger on your mobile phone’s fingerprint scanner has to be the easiest, most seamless way to unlock the device, and this is why more and more manufacturers equip their mobile products with it. In fact, it is predicted […]
March 24, 2015
Via: cloud-securityWith the vast majority of enterprises now making use of cloud environments, 54 percent globally reported keeping sensitive information within the cloud, according to Vormetric. With databases and file servers typically rated as top risks for storage of sensitive information, […]
March 11, 2015
Via: application-security#android apps that use #dropbox for #storage and are built using an older version of its #sdk are vulnerable to an attack that can steal data, although Dropbox has released a fix, according to IBM #security researchers.IBM’s #application security research […]
January 12, 2015
Via: featuredCitrix purchased Sanbolic today, a company that provides virtual #storage optimization services, filling in a missing piece in its #virtualization product portfolio with the acquisition. It’s worth noting that Sanbolic plays nicely with Citrix desktop virtualization technology and considered Citrix a strong […]