A reader asks: “Where does cloud storage really reside? And is it secure?” Quentin Hardy, The Times’s deputy technology editor, considers the question. _____ “Cloud” data is stored on hard drives (much the way data is usually stored). And yes, it’s probably more secure than conventionally stored data. What makes cloud storage different? Instead of being stored directly […]
The traditional approach to DR requires significant investment of time and resources. At minimum, users must consider how they would replicate their primary infrastructure to a secondary site. That secondary site needs to be procured, installed, and maintained. During normal operations, the secondary site will typically be under-utilized or over-provisioned. https://www.rubrik.com/blog/disaster-recovery-cloud-options/
The feeling of security and the reality of security don’t always match, says computer-security expert Bruce Schneier. In his talk, he explains why we spend billions addressing news story risks, like the “security theater” now playing at your local airport, while neglecting more probable risks — and how we can break this pattern.
How do you pick up a malicious online virus, the kind of malware that snoops on your data and taps your bank account? Often, it’s through simple things you do each day without thinking twice. James Lyne reminds us that it’s not only the NSA that’s watching us, but ever-more-sophisticated cybercriminals, who exploit both weak […]