Double, double toil and trouble — there’s danger and grief stewing all throughout the cloud environment cauldron. Yikes, might as well stay in bed lest we get up and stub a toe or endure some unpleasantness on the way to the office. Or instead we could buck up and simply apply judicious caution while leveraging one of the greatest technological …
Infiltration: A Pen Tester’s View
Penetration testing is an effective, essential element of determining if your systems, processes, and employees are up to the task of securing your infrastructure. People are typically the weakest links in the chain — and particularly vulnerable to phishing emails. Read about some first-person experiences in the article below by Brian Prince in Dark Reading. Emphasis in red added by …
AIS Infographic: Top 5 Most Infamous Hackers
In the rise of the digital age, the Internet has opened up a whole new playground for criminals to explore. Cyber crime is rampant. A recent popular example of this is Target’s data breach that left up to 40,000,000 customers’ credit and debit cards hacked. If you shopped at a physical Target store anywhere in the world between Thanksgiving and …
Safe Sex Recommended to Avoid HTML?
My Fellow Americans: You rock! News reports like the one below make it harder for The Onion to find ways to make us all laugh. Summary article by Nicole Henderson in The WHIR, original story by Salvador Rodriguez in the Los Angeles Times. Emphasis in red added by me. Brian Wood, VP Marketing —— 11 Percent of Americans Believe HTML …
Advanced Persistent Threat (APT) War Stories
James Bond and Jason Bourne movies are super fun to watch — because there’s a great thrill in spy novels and whodunnit stories. The article below, by Roger Grimes in CSO Online, shares some of those same thrills and spills but in the context of cyber security. Check it out, it’s a good read. Emphasis in red added by me. …
Opinions on Snooping, Passwords, Personal Info
Non-news flush: According to the Fortinet survey results below, Millennials and Gen-Xers have pretty much the same opinions when it comes to passwords, online marketing practices, email snooping, and the value of their personal data. In other words, there is NOT a generational divide on these topics as expressed in this survey. Still, though, the results are interesting in and …
We Don’t Use Google Glass
Part of me wants to poo-poo the “look at me” crowd playing with GG — and yet part of me recognizes that there are indeed (most likely) measurable benefits to be gained from this and other wearable technologies. But what I really wonder is whether wearers of GG utter “be right back” (or type “brb”) when they need to disconnect …
RSA: Are the Bad Guys Winning?
While the large attendance at the RSA security conference is a positive leading indicator for folks hawking security products and services, it’s a negative indicator for tens of thousands of small, medium, and large business spanning nearly every vertical market imaginable. The temperature is rising, and that affects all of us. Article by Jaikumar Vijayan in Computerworld. Emphasis in red …
IHS Cloud Claims: Up 20% in 2014, 200% by 2017
All boats rise with the tide — and the cloud tide is rising quickly. While revenue growth has not yet caught up with cloud’s marketing hyperbole and obsessive fanaticism, it is certainly pointing in the (up and to the) right direction. Up 20% in 2014, up 200% between 2011 and 2017. Cheers! By David Hamilton in The WHIR. Emphasis in …
Tell the Truth: Would You Lie to CEO?
A good manager does not “freak out” when an employee presents bad news…sometimes really bad news. Don’t shoot the messenger — or else the remaining messengers learn to sugarcoat, skew, or filter the information and their communicated opinions and recommendations. We’re all in this together; let’s start by assuming the good intentions of our fellow employees and then address the …