This is one of the best low-cost security products to come along in a long time. Here's why. A few years ago, I attended a security conference sponsored by Ingram Micro (a large distributor of technology products, for those of...
Category: Business Practices
SSL and Certificates – Part 4 of 3
Yes, it's time to add on another post about SSL certificates. I suppose I could have gone back through all of the posts and corrected the titles to "Part x of 4," But, in the spirit of Douglas Adams, whose...
Tips for Securing an IoT Deployment
Hard on the heels of updating my earlier post about the Internet of Things (IoT), I came across another post on ZDnet entitled "How to Secure Your IoT Deployment in 10 Steps," that was published a few days ago. While...
SSL and Certificates – Part 3 of 3
Part 1 and Part 2 of this series covered the basic cryptographic concepts behind SSL certificates, and looked at how an SSL certificate is constructed and how it is validated. This installment will discuss what different kinds of certificates exist,...
SSL and Certificates – Part 2 of 3
In Part 1, we discussed basic cryptography, and worked our way up to symmetrical encryption systems such as AES, which accepts key lengths as long as 256 bits. We also discussed why key length was important to a cryptosystem, and...
SSL and Certificates – Part 1 of 3
There has been a lot of confusion regarding what SSL certificates are all about – what they are, what they do, how you use them to secure a Web site, what the “gotchas” are when you’re trying to set up...
Microsoft’s New Patch Strategy
Starting yesterday (October 11), Microsoft began rolling out a new way to patch Win7, Win 8.1, Server 2008 R2, Server 2012, and Server 2012 R2 systems. Instead of releasing a bunch of individual updates, they will be pushing out monthly...
Beating Malware by Disrupting Command and Control
One of the key strategies in modern warfare is disrupting the enemy’s command & control infrastructure. It can also be an effective strategy in the ongoing war against malware. One of the first things that usually happens when a PC...
The Case for Office 365
Update – May 7, 2015 In the original post below, we talked about the 20,000 “item” limit in OneDrive for Business. It turns out that there’s another quirk with OneDrive for Business that we didn’t touch on in our original...
Hyperconvergence and the Advent of Software-Defined-Everything – Part 2
As cravings go, the craving for the perfect morning cup of tea in jolly old England rivals that of the most highly-caffeinated Pacific Northwest latte-addict. So, in the late 1800s, some inventive folks started thinking about what was actually required...