Improving Policy Compliance with Automatic Remediation
We've posted a new article on policy compliance and remediation. Here's an excerpt:
Continue reading Improving Policy Compliance with Automatic Remediation...
Email Address:
We've posted a new article on policy compliance and remediation. Here's an excerpt:
Continue reading Improving Policy Compliance with Automatic Remediation...
People have known about a fundamental flaw in a major Internet protocol ten years or so and it still isn't fixed so a couple of researchers decided to demonstrate. Anton "Tony" Kapela and Alex Pilosov demonstrate the design flaw (not a bug, this can't be patched) in the Border Gateway Protocol (BGP) at DefCon. The exploit tricks routers into redirecting traffic to an eavesdropper's network.
Continue reading How Long Will We Wait to Address Fundamental Flaws?...
The LA Times story Public, private sectors at odds over cyber security is not your typical high profile security story. Rather than focus on a single data breach or a new vulnerability, it looks at the question of how to address fundamental flaws in existing infrastructure. The answers are not promising.
Continue reading Private, Public Sectors Look to Each Other to Solve Security Problems...
Ruby on Rails is a powerful framework for developing Web database applications. In this podcast we look at security tips related to user input, model/controller separation, core Ruby functions, and basic database security measures.
Is it day 7 already, or is it 6? I haven't blogged for days on the topic because, well, there isn't much to say about switching from desktop to online applications. While that itself is a point worth noting, there are more substantive aspects of online apps worth discussing. Earlier posts are here and here.
I am realizing it isn't so much a question of how can I get all the features of desktop apps from online apps but how does working online enable me to do things differently and more efficiently.
Continue reading Trading the Desktop for the Cloud: Day 7...
The seasonal drama of electronic voting machines begins again. Today the Washington Post is reporting that a programming error in some Premier Election Solutions (once known as Diebold) machines dropped votes when transferring data to central servers.
Continue reading Voting Machine Drops Votes, Vendor Blamed Anti-Virus...
The September issue of Scientific American is dedicated to the future of privacy. Topics include:
The second day of this experiment of using online tools to repalce the desktop showed a couple of weak links but still no major problems.
Continue reading Trading the Desktop for the Cloud: Day 2...
Dan Sullivan is a systems architect with 20 years of IT experience that includes engagements in enterprise security, application design, and systems architecture. His experience includes a broad range of industries, including financial services, manufacturing, government, retail, gas and oil production, power generation, and education. Dan’s security-related project work has ranged from requirements analysis for enterprise information security to designing and implementing security for database applications and enterprise portals. Dan has written about information security and other enterprise information management topics for Business Security Advisor, DM Review, Intelligent Enterprise, and E-Business Advisor. You can contact Dan at: dan_sullivan@realtimepublishers.net