One look at the headlines is all it takes to see why security is at the forefront of every IT team’s mind. Hacks, data theft—you name it; some of the largest corporations have succumbed to these pitfalls over the past few years, and there’s no end in sight. It's no...
Readers of previous posts are aware of my reservations on the current ubiquitous drive to connect absolutely everything (from the frivolous to the useful) to the internet but there is no denying that the trend will continue unabated. This will create security risks that...
Regardless of industry, companies are subject to data protection laws according to their jurisdiction.
Privacy is something that every organization needs to take seriously. When customers and clients trust an organization with their private information, that trust needs to be respected. As with healthcare, the insurance industry needs to adhere to significant regulation.
Companies around the world have anxiously awaited who will be made an example of under the new GDPR regulations. Under GDPR, entities who violate the regulations are on the hook for stringent fines and civil lawsuits.
Nearly a million servers around the world still run the unsecure legacy FTP protocol and are actually configured for ‘anonymous’ access. Not good.
With OpenSSH, you can remote into any operating system from any operating system. This is a wonderful thing!
FIPS 140-2 is a requirements document that sets the minimum strength level for data encryption used in Sensitive But Unclassified (SBU) federal operating environments. But its influence goes far beyond this significant but delimited area.
Network Security has multiple concepts. One such model is the Before-During-After concept, which I will break out into different phases. Specific to incident and problem management in IT, this methodology plays an important role for IT teams.