Some Perils of Deep Packet Inspection
“Quis custodiet ipsos custodes?” Microsoft, Cisco, Checkpoint, Nortel, SonicWall, Fortinet, Juniper/Netscreen, and others, have jumped on the marketing bandwagon first manufactured by Checkpoint in...
View ArticleManaged Security Services – Part I: The History
Most definitions of Managed Security Services (MSS) begin by citing case after case of terrifying security incidents, backed by a laundry list of guess-timated loss statistics usually provided by one...
View ArticleManaged Security Services – Part II: The Cloud
The Cloud As bandwidth increased, as servers and operating systems became commoditized, and pressure increased on IT groups to do more with less, these managed services were rebranded, and became the...
View ArticleManaged Security Services – Part III: The Current Environment
As we have said earlier, IT security is hard. True professionals in information security must be expert in a number of fields including: networking, programming, and operating systems. These...
View ArticleManaged Security Services – Part IV: Making the Choice
Managed Security Services (MSS) provide a unified solution for protecting data, for allowing secure communication across the Internet, for secure linkage with business partners, and for compliance with...
View ArticleWhy Remote Wipe is Dumb: Part I
Recently published data indicate that the average businessperson has 3.5 such mobile devices – a laptop, a tablet or netbook and one or two cellular phones. This number has doubled in three years and,...
View ArticleWhy Remote Wipe is Dumb: Part II
OK. Let’s assume for a minute that remote wipe is on your checklist when you go shopping for a mobile security solution. You are looking for peace of mind when a mobile device gets lost or stolen or...
View ArticleInformation Security in 2020: Part I
“Just because everything is different doesn’t mean anything has changed.” The principles that motivate current approaches to securing information and the systems that store, process, & transmit...
View ArticleInformation Security in 2020: Part II
In our last post we asked a simple question: Why do data breaches still occur? In order to begin to answer this question, we need to start by looking at the state of the contemporary security scene –...
View ArticleInformation Security in 2020: Part III – Crypto
Cryptography underlies the provision of security for just about every kind of contemporary communications network, and I believe that this is unlikely to change soon; although, as we have seen...
View ArticleThe Enemy: Cyber Criminals, Cyber Warriors, Hackers, & Punks
The Enemy: Cyber Criminals The list of categories of cyber crime is growing, & is, for the most part, advancing in lockstep w/ technology advances. Some of these crimes overlap, but a...
View ArticleA Concise Definition of Four Commonly Misused Security Terms
1. Information Assets (a thing): 1.1. Information assets (IA) may include database records, software code, critical company data, & other intangible items. These intangibles may include...
View ArticleCloud Service Models & Security – A Primer
The various kinds of services that cloud computing platforms provide are typically lumped together into three categories called service models: Infrastructure as a Service (IaaS) In the IaaS service...
View Article
More Pages to Explore .....