Mutating malware: Roger Grimes gives us a peek inside the network security arms race, where virus and worm authors evade signature-based detection techniques through "server-side polymorphism," and malware fighters seek a better defense. Say what? Server-side polymorphism? See today's Security Advisor. Hash and stash: In today's Storage Insider, Mario profiles two startups that are rethinking how data is stored: Mutating malware: Roger Grimes gives us a peek inside the network security arms race, where virus and worm authors evade signature-based detection techniques through “server-side polymorphism,” and malware fighters seek a better defense. Say what? Server-side polymorphism? See today’s Security Advisor. Hash and stash: In today’s Storage Insider, Mario profiles two startups that are rethinking how data is stored: Instead of storing complete data sets in a single bucket, they break the data into fragments and store them in multiple places. Cleversafe uses “dispersed storage” to boost data security, while RevStor applies the technique to disk to disk backup pools. Green in twelve steps Going green can save you money, spare the air, engender feelings of goodwill in customers, and allow you to shame reprobate competitors. So good, but how do you get started? Forrester Research has a plan, which Ted Samson examines in yesterday’s Sustainable IT. Technology Industry