It’s an easy decision: Get a free ProtonMail account and use that as your verification address for important financial and social media accounts. Keep using whatever email account you like for regular communication, but don’t mix security and communication!
Sure, single sign-on puts all your eggs in one basket. But this is vastly preferable to trusting that hundreds of third-party baskets are secure, especially when they prove on a weekly basis that they aren’t! It’s time to put distributed passwords behind us and switch to systems like SAML, both for businesses and consumers.
I had a little bit of a learning experience this week regarding NFS exports and Mac OS X that I thought would be interesting to share with my readers. It’s part “simple tip” and part “facepalm.”
Edward Snowden, NSA whistleblower, appeared at TED2014. His video, embedded below, must be watched. You may think he’s a hero or you may think he’s a villain, but he’s unequivocally right about one thing: We must protect the integrity of the Internet and online communications or we risk disrupting the world economy and all of our lives.
I am a heavy (and paying) user of Dropbox, using it both for business and personal storage and synchronization. Although I find the service incredibly useful, Dropbox is far from perfect, especially for business users. So I thought I would take a few moments to talk about what I’d like to see Dropbox improve.
Surprise! Huawei Symantec has arrived in the United States, ready to take on the midrange storage and network security market with a line of devices that have proven their worth in the international market for three years. I sat down with the company’s management at Storage Networking World and quizzed them on their plans and aspirations for growth.
The last few weeks have been tough on my web servers. The release of iPhone OS 3.0 tripled my site traffic overnight as folks investigate the new Exchange integration features, and traffic to IT commentary site, Gestalt IT, which I also host, has been growing rapidly. Plus, Google just refreshed PageRank again, sending even more […]
What is the megatrend of this decade? I suggest that we are witnessing a wholesale shift from information tied to place/device to information mobility. Cloud computing, server virtualization, and even flash memory are all contributors to this massive trend, along with the user-side trends of the post-PDA mobile phone, 3G data, social web services, and connected home.
One of the great ironies of storage technology is the inverse relationship between efficiency and security: Adding performance or reducing storage requirements almost always results in reducing the confidentiality, integrity, or availability of a system. Many of the advances in capacity utilization put into production over the last few years rely on deduplication of data. […]
This is part of an ongoing series of longer articles I am posting on Sundays. In this digital age, it is easy to overlook the critical element of physical security. Put simply, it is often far more efficient to steal or gain access to a physical object like a laptop or flash drive than to […]