Securing the Internet’s DNS

Thursday, April 24th, 2008

The Internet is slowly inching closer to ratcheting up the security of its Domain Name System (DNS) server architecture: The Internet Corporation for Assigned Names and Numbers (ICANN) plans to go operational with the secure DNS technology, DNSSEC, later this year in one of its domains. ICANN officials said the organization ...

A Case Study on Storm Worm

Friday, April 18th, 2008

A bot is a computer program installed on a compromised machine which offers an attacker a remote control mechanism. Botnets, i.e., networks of such bots under a common control infrastructure, pose a severe threat to today’s Internet: Botnets are commonly used for Distributed Denial-of-Service (DDoS) attacks, sending of spam, or ...

Why Small and Medium Enterprises don’t use 802.1x

Wednesday, April 16th, 2008

With JJ blogging about 802.1x, I thought it would be timely to talk about why I think small and medium sized enterprises (SMEs) do not and probably never will deploy 802.1x for wired networks. I make a point of meeting with customers whenever I can. Amongst the small and medium ...

Data Security Tips for CIOs: Wiping the Hard Drive

Friday, April 11th, 2008

Security issues are on the minds of all CIOs these days. Whether the CIO of a 1,300-student liberal-arts college or that of a 13,000-employee Fortune 100 company, never before has the issue of data security been more important. Besides a record-breaking year of data breaches, legislation such as Sarbanes-Oxley, Gramm-Leach-Bliley ...

Microsoft Releases 14,000 Pages Of Trade Secrets

Tuesday, April 8th, 2008

Microsoft continued to release formerly closely-held application protocol documentation Tuesday, posting 14,000 pages of information for Microsoft Office 2007, SharePoint Server 2007 and Exchange Server 2007 at MSDN, a Web site for developers. The protocol information released includes protocols that allow Exchange Server to communicate with Outlook and those used by Office ...