In San Francisco last week, AWS opened their summit series for 2014. 5000+ people packed into the Moscone Center, and there was a ton of energy in the air. I was fortunate enough to have the opportunity to attend and to speak. I presented, “Updating Security Operations for the Cloud,” which is the talk I’ve…Read More
Almost every organization is using cloud computing in some way today, eager to cut costs, improve IT efficiency, and make their business more agile. Many organizations have started their journey by hosting their Web sites in the cloud, hoping to take advantage of the proven scalability and test performance before making a bigger shift. The…Read More
Advanced persistent threats have emerged as one of the top risks for organizations. Usually carried out by highly experienced attackers, APTs entail the infiltration of a secure network for an extended period of time.
Two weeks from now, Windows XP will come to the end of its long and successful run. When the history books are written, Windows XP will likely go down as the most successful version of Windows in history. But all good things must come to an end, and that includes computer operating systems. After April…Read More
My last few posts have looked at the impact you can expect hybrid and full cloud environments to have on your security practice. I’ve called out incident response, monitoring, and forensics as areas that can benefit from the flexibility provided by cloud environments. But what about the big picture? How do these areas come together…Read More
Citrix has just announced the latest update to their cloud orchestration and management platform, CloudPlatform 4.3, helping Citrix customers to easily build scaleable private, public and hybrid cloud environments. Following this release, Trend Micro will begin the external beta program for the latest version of Deep Security, 9.5, which provides the highest levels of security for…Read More
The Obama Administration recently unveiled the Cybersecurity Framework, a guide for protecting critical national infrastructure such as electrical grids and water and fossil fuel supplies from cyberattacks.
Many words have been shared about the availability of questionable or outright illegal content through websites and forums hosted on the Dark Web. Many blogs have been written about the bust of the Dark Web site that has become a poster child for all that is bad about hidden services, “Silk Road.” We know that…Read More
Windows XP is still so widely used and so integral to infrastructure such as ATMs that one can perhaps be forgiven for overlooking how old it is.
Most malware is designed to attack your computer at the application or operating system (OS) level. Viruses, worms and Trojans do their dirty work alongside your regular applications on top of the operating system while rootkits get installed as kernel modules inside your operating system. Much of this malware can be blocked before being installed…Read More