Feeds

Security: It's knowing what you don't know

... and what you can do about it

  • alert
  • submit to reddit

Intelligent flash storage arrays

Live Reg TV Some vendors will tell you that security problems are solved by sticking a device on the edge of your network, but we all know that 100 per cent security is a fantasy.

You will be attacked by both known and unknown threats, and some of those attacks will be successful. This means that recognising the signs of an attack quickly – and being able to limit the effect on your business when those attacks succeed – is fundamental to your security policy.

Bob Corson from Trend Micro will be in the studio to describe the nature of threats today and how we should be managing them. He's joined by The Dark Lord, aka Tony Lock, who returns to the studio to fill us in on how the Reg audience is coping with the known unknowns of security.

Whether it's a Magic Kitten or the Second Bureau of the People's Liberation Army's General Staff Department's Third Department which is attacking you, it is how you protect yourself that counts.

Join us live on 1 April at 13:00 BST for a Regcast that will help you survive the attack of the known unknowns.

You can sign up for to watch this live event here.

Security for virtualized datacentres

More from The Register

next story
Knock Knock tool makes a joke of Mac AV
Yes, we know Macs 'don't get viruses', but when they do this code'll spot 'em
Shellshock over SMTP attacks mean you can now ignore your email
'But boss, the Internet Storm Centre says it's dangerous for me to reply to you'
Why weasel words might not work for Whisper
CEO suspends editor but privacy questions remain
Feds seek potential 'second Snowden' gov doc leaker – report
Hang on, Ed wasn't here when we compiled THIS document
DEATH by PowerPoint: Microsoft warns of 0-day attack hidden in slides
Might put out patch in update, might chuck it out sooner
China is ALREADY spying on Apple iCloud users, claims watchdog
Attack harvests users' info at iPhone 6 launch
prev story

Whitepapers

Cloud and hybrid-cloud data protection for VMware
Learn how quick and easy it is to configure backups and perform restores for VMware environments.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
The next step in data security
With recent increased privacy concerns and computers becoming more powerful, the chance of hackers being able to crack smaller-sized RSA keys increases.