What's In a Name? Announcing Truth in Labeling

Andrew Jaquith

A few days ago, my colleague Chris McClean asked the excellent question, "Is Risk Management Compatible with ERM?" I saw the headline come across my RSS reader and I thought, "Cool! I'd love to read what Chris thinks about enterprise rights management," a technology that I cover as part of my data security coverage. I'd advise you to read his post, which is excellent.

Read more

HP Acquires Cluster File Storage Software Vendor IBRIX

Andrew Reichman
Today, HP announced that they will be acquiring the startup cluster file storage software firm IBRIX in a deal with few disclosed details. Congrats to HP for making another interesting acquisition in the clustered storage space, following their Feb. 2007 acquisition of Polyserve and their October 2008 acquisition of Lefthand. IBRIX makes software that allows users to cluster many nodes of storage (either industry standard servers or iSCSI/FC SAN arrays) for use in high performance global namespace file storage.  IBRIX’s customer base includes some 175 firms, generally in the high performance compute (HPC), video rendering/animation, and oil and gas exploration spaces.

Read more

Cybersecurity Czar – Where art Thou?

Khalid Kark

Bill Brenner at CSO recently wrote an interesting piece highlighting the urgency of having a cybersecurity leader. Although I do not agree with him that the simple DDOS attacks on government Websites could have been prevented by having a Cybersecurity Czar, I do agree with him that we need a cybersecurity leader – now!  

We all rejoiced when President Obama ordered a 60 day cybersecurity review shortly after taking office. We were all excited when, on May 29th, a report summarizing the findings of the cybersecurity review was released and the president declared cybersecurity as a national security priority for his administration, and a personal goal for him.

Read more

Securing Google's Chrome OS