Infrastructure
September 9, 2016
SIEM is a system, that collects logs and other security related data for analysis. In most cases, it installs an agent someplace that gathers security-related events from the various pieces of...
Sometime back, I chronicled one of the most infamous “hacks” that ever happened. A gentleman named Jason Cornish brought the Shionogi Pharmaceutical Company to its knees. In a nutshell, he and...
Infrastructure
June 10, 2016
Maintaining the performance and security of your virtual environment on a daily basis is an important — and non-trivial — task. VMware monitoring tools are a critical component of a solid...
Cybersecurity
April 29, 2016
Some time ago there was a big discussion on Spiceworks about FedEx data leakage. Roughly 5 GBs of data was going from it daily to an IP address in Bulgaria. Since a third-party actually owned the...
Infrastructure
December 28, 2015
One post thread on Spiceworks caught my eye. The Spicehead wanted to know what to do about passwords when it came to DR plans. Was he supposed to put the passwords into it, or just what was he...
Infrastructure
November 13, 2015
Part two of a Disaster Recovery process is the actual plan. You have to look at what could go wrong and either eliminate the possibility it would, or at least lower the impacts. So, if you failed to...
Infrastructure
September 29, 2015
Mitigation (eliminating or lowering the impact of an incident) is a crucial part of any Disaster Recovery plan, as well as planning itself. I’ve always wanted to underscore the need to have this...
Infrastructure
June 12, 2015
Grandpa always said, “Never try anything new. Wait and see if it kills someone first”. Recently, I’ve been involved in bringing several Single Sign On projects to fruition, and his words have...
Infrastructure
February 25, 2015
A recent posting in Spiceworks caught my attention. It seems that this admin was asked to generate an Internet usage report on a fellow employee. The next thing he knows, the employee was let go. Of...
Infrastructure
February 13, 2015
Those who study epidemics, talk about the spread of disease through what they call “vectors”. Some are spread through food, water, human contact, and so on. In the computer world, viruses and...