Tag Archives: security

Ransomware Doesn’t Just Target Noobs: The Enterprise Implications of Cyber-Hijacking

By | March 18, 2016

This column initially appeared on Diginomica as Digital Hijackers: The Rising Threat of Ransomware to Business Imagine you are the CEO of a hospital and come in one day to find staff in a panic because they can’t use critical systems like CT scanners, lab test and emergency room equipment or access pharmacy records. That’s precisely the nightmare scenario… Read More »

The Apple-FBI Imbroglio Offers Lessons For Enterprise IT

By | March 17, 2016

The following article was originally published on Diginomica as Apple-FBI Impasse: A Teachable Moment For Enterprise IT When technology and public policy collide, it invariably creates waves, however in the case of iPhone security versus FBI evidence collection, it’s more like a tsunami. The technical and legal details of the FBI’s case against Apple and the inevitable back-and-forth… Read More »

An Analysis of iPhone “Error 53”: Poorly Implemented Protection of a Secure System

By | February 14, 2016

This article originally appeared in Diginomica as iPhone Error 53 – a study in bungled user experience, but great security Apple is one of the most polarizing tech companies around, attracting both loyal supporters and equally strident critics whenever it does something remotely newsworthy. The latest dustup concerns an ambiguous, but apparently fatal error that some iPhone users report… Read More »

AWS Security Management: In Need of Automation

By | December 27, 2015

A verson of this article originally appeared on TechTarget SearchAWS as Rely on cloud security policy — not tools — to protect AWS Managing security policies and incidents on IaaS can be complex and challenging. Here’s what vendors are doing about it Once enterprises move workloads to cloud infrastructure, they soon realize that the tools for enforcing security policy… Read More »

Open Wi-Fi Means Open Season For Hackers: How To Secure Mobile Connections

By | November 25, 2015

The world’s Going Mobile: The Who’s song about life on the road has taken on a prophetic new meaning in the smartphone era; unfortunately, mobile networks are typically about as secure as a tent trailer. There are now over 7 billion mobile subscriptions, over 30% of those with smartphones, and global mobile data traffic grew by 69% last… Read More »

A Guide to AWS Identity Management and Policies

By | August 29, 2015

Portions of this article appeared in the Tech Target SearchAWS E-HandBook: Your Role in AWS Security. AWS security is built upon a powerful identity and access management service (IAM) with a rich set of features befitting of an enterprise platform. Yet the IAM management console, nestled within an overflowing AWS service dashboard, is deceptively simple, belying the complexity… Read More »

Book Review – Geekonomics: The Real Cost of Insecure Software

By | August 27, 2015

If you’ve ever wondered why the first thing you have upon booting a new PC, with it’s pristine copy of Microsoft’s latest and greatest, is spend the next few hours loading extraneous security software – anti-virus, spyware protection, firewall, spam filter – David Rice has a theory for you. As he expounds at great length in his first… Read More »

Security’s Silver Bullet Is Virtualization: Bromium, Microsoft, VMware Show How

By | July 15, 2015

Virtualization has long been used to wring efficiency out of over-sized, under-used systems, but isolating applications and operating systems from the underlying hardware also produces immense flexibility that cloud services like AWS, Azure and Google Cloud exploit to deliver infrastructure on demand. Yet virtualization has become instrumental to solving the most vexing and serious problem facing IT providers… Read More »

How to Use CloudTrail to Guard AWS Applications

By | July 1, 2015

A previous version of this article appeared on TechTarget SearchAWS as Police your public cloud with AWS CloudTrail CloudTrail is a powerful tool for monitoring and auditing AWS deployments, but as a relatively new service, introduced in late 2013, many AWS users may not be aware of its capabilities and potential.  As we summarized in this article on AWS… Read More »

AWS Logging Tools Simplify Automated Security Monitoring

By | June 3, 2015

A version of this article appeared on SearchAWS as “AWS logging tools provide extra security“ Cloud denialism is on the wane, but the most persistent excuses enterprises give for avoiding public cloud services remain a loss of control, security and visibility. These issues have been amply addressed and debunked, both by the cloud services themselves and independent analysts,… Read More »