General

Last Updated on 3 April 2014, Total: 148 Blog Posts

  1. Eulogy for TMG – Monthly Newsletter

    This year we celebrated the 15th birthday of Microsoft's proxy/firewall solution that has gone through a couple of name changes to get where it is today. Sadly, on September 12, Microsoft announced that the company is discontinuing TMG, along with FPE, FPSP, FSOCS and TMG Web Protection Services… Microsoft will continue to support the products through 2015, with extended support... Read More

  2. Set the desired level of IOPS with Amazon RDS

    Amazon's Cloud computing now includes new high performance provisioned IOPS storage for its Relational Database Service. Now, you can provision new RDS database instances with 1,000 to 10,000 IOPS, and with 100GB to 1 TB of storage for MySQL and Oracle databases. If you are using SQL Server, the maximum IOPS you can provision is 7,000 IOPS. The creation of... Read More

  3. IT Pros and Technology Consumers – Monthly Newsletter

    We often think about the IT professional and the technology consumer as two very different and always separate entities. Tech vendors target their products to one market or the other. Tech publications write to one audience or the other. But whereas Grandma might not ever buy a Cisco Catalyst 6509 switch or understand a word of the articles published on... Read More

  4. The European Cloud Computing Strategy

    The European Commission aims at enabling and facilitating faster adoption of cloud computing throughout all sectors of the economy in order to boost the productivity, growth and jobs in Europe. The strategy includes three key actions which are Standards & Certification, Contract terms & Conditions, and European Cloud Partnership Read more here - http://ec.europa.eu/information_society/activities/cloudcomputing/cloud_strategy/index_en.htm... Read More

  5. There is Too Much Cooling in Data Centers

    According to an assistant professor of computer science at the University of Toronto Scarborough, server environments can easily operate at warmer temperatures thus saving costs on air conditioning without endangering the health and performance of the hardware. Read more here – http://www.tomsitpro.com/articles/datacente-cooling-science_research-UTSC,1-549.html... Read More

  6. HTTPS sessions can be hijacked!

    Security researchers discovered that even HTTPS encryption that is used for secure connections throughout the Internet can allow attackers to hijack web browser sessions that support SPDY or TLS compression. SPDY is an open networking protocol used by Google and Twitter. This security weakness can be exploited when web sessions are protected by SSL or TLS and are using one... Read More

  7. Security implications of HDMI Ethernet Channel

    VGA is almost dead and with new PCs and laptops we get HDMI, but under the hood this brings many other capabilities than just displaying video. HDMI Ethernet Channel could circumvent corporate security in a number of ways, such as through the use of network-enabled display technologies and via HEC-enabled corporate laptops, but the technology is still largely unsupported. Often... Read More

  8. Many wireless networks in London are still unsecure!

    On his well-equipped bike, James Lyne cycled for 91 miles across central London to discover how many wireless networks he could find with outdated weak encryption or no encryption at all! With help from a GPS, two dynamos, and a computer pimped up with solar panels, thousands of unsecured wireless networks were discovered! Read the full article here - http://www.cybercrimesunit.com/warbiking-in-london/... Read More

  9. What are some steps businesses should take to protect their data and reputation?

    Organizations most often overlook simple steps that would help them protect their data! A breach can cost a company monetary and reputation loses hence, companies should consider implementing controls that enhance cyber security. But what is the best approach to guard against cyber security risks? The Division of Corporation Finance, a part of the Securities and Exchange Commission, has issued... Read More

  10. An overview of security articles in EU legislation

    A whitepaper published by the European network and Information Security Agency (ENISA) gives an overview of the legal aspects of cyber security in the European Union (EU). Although, the majority of data breaches do normally make it to the press but there are many breaches which remain either undetected or not reported. EU considers effective legislation is key here and... Read More

Featured Links