Posts Tagged "HP"
Security professionals need to be performing the same kinds of risk analysis and business impact analysis that business continuity professionals have been doing for dozens of years. As part of that risk analysis you need to determine your most important information, its lifetime, and whether or not you are properly protecting it.
In a Chinese kitchen, there is a lot of prep work to do before you can start cooking. The same is true before you can move into a workplace recovery center. Secure Pocket Drive from SPYRUS can make this prep work a lot easier.
Steve Layman, one of my friends and a Hewlett-Packard co-worker, died of Non-Hodgkins lymphoma a couple of weeks ago a month short of his 44th birthday and four months short of his tenth wedding anniversary. My dad died of the same disease when he was 44. But this is not a story about Steve nor […]
ChoicePoint suffered a security breach in 2008 after they had already been ordered by a federal court to impose a data monitoring system. Unfortunately, someone turned it off for 4 months.
As I predicted in an earlier post, Larry Ellison has told Reuters, “We are definitely not going to exit the hardware business. If a company designs both hardware and software, it can build much better systems than if they only design the software. That’s why Apple’s iPhone is so much better than Microsoft phones.” I opined […]
An article in the UK’s Daily Mail said that a used hard drive recently purchased on ebay included test launch procedures for Lockheed Martin’s THAAD (Terminal High Altitude Area Defense) missile defense system used to shoot down Scud missiles in Iraq. Also on the same disk were security policies, blueprints, and employees’ personal info. Confidential corporate […]
If you are attending the HP Technology Forum & Expo 2009 in Las Vegas on June 15-19, I hope that you will be able to join me for these two sessions: Session 3942 on Thursday 10:30 AM in Banyan E. Will Volume-Level Encryption Keep My Data Safe? This session will help you understand what volume-level encryption can […]