AKIBIA'S PRACTICAL GUIDE TO ENTERPRISE TECHNOLOGY
Thursday, January 17, 2013
Today, Data Center Modernization has become an even greater priority than ever; as organizations are challenged with effectively managing their data center infrastructure with increasing demand and technology evolution driven by more competitive cost options, a greater demand for capacity, and increasingly important Service Level Agreements, system performance and security requirements.
Thursday, January 03, 2013
Organizations are usually quite adept at protecting sensitive data and preventing hacker intrusions, but many lack the physical controls that are necessary to reduce risk. A good definition of physical security is measures that are designed to deny access to unauthorized personnel to a building or resource. A more broad definition includes not only protection from hostile or accidental intruders, but from other physical factors such as fire, flood and accidental damage. Physical controls are important because physical security breaches can occur accidentally, or can be carried out by attackers who are not technically savvy. Many compliance standards require proper physical security as part of the overall security plan.
Friday, December 14, 2012
With the holidays imminent, many of you are looking for new computer systems, and with prices slashed sometimes as much as 50% or more, Black Friday and Cyber Monday deals were too good to ignore. Let’s not be fooled into thinking that every computer manufacturer isn’t making profit. No one values your personal information more than yourself, so step back and consider this before firing up your latest purchase.
Saturday, November 17, 2012
For those of you who keep up-to-date on the latest IT trends you’ll probably notice various topics constantly posting to your favorite blog site - everything from the latest data leakage issues to compliance related hurdles and even BYOD concerns scatter the Internet. You might even be interested in the occasional “How To” guides but I find myself often drawn to the latest money saving hints, tips and tricks. One topic I haven’t seen mentioned in some time is self-signed digital certificates versus verifiable CA (certificate authority) and the related cost versus the benefit factors. Web sites such as Go Daddy, Verisign or Symantec offer various options. Cost saving package deals may sometimes be perfect for larger service providers but in reality not everyone needs the overhead and extra expense. Although there are serious benefits from purchasing a SSL cert from a CA, spending the money is not always a necessity and certainly is not required.
Friday, August 10, 2012
As security professionals, we are often asked to provide our opinions on various topics ranging from parental controls and online banking to “should I use a Mac or Windows machine?”— and which of those is more secure. I often assume a neutral, objective approach while sharing experiences and advice. I understand that everyone has an opinion and it is not for me to judge.
Wednesday, June 06, 2012
Modernizing data center operations is on the minds of just about every organization. The light speed pace at which technology advances opens up new and ingenious ways of performing data center operations more efficiently and cost effectively. To that point, most organizations are either actively moving or considering the move towards converged data center operations; otherwise known as centralized fabric or cloud computing. The initial modernization attempts were started early on with storage consolidation and server clustering. Companies immediately felt the benefits of centralized control with high availability and the storage explosion had begun. OEM manufacturers quickly raced to provide bigger and more powerful storage arrays to meet the customer demand.
Overwhelmed by the results of web application testing? Gain control of the test & remediate process.
Wednesday, May 30, 2012
Specialized web application security scanners perform in-depth testing of web sites and provide more comprehensive information than basic vulnerability scanners. Web application testing usually results in the discovery of dozens and sometimes even hundreds of common vulnerabilities. In circumstances where web developers insist their code is not vulnerable to the specific exploits cited refer to the group that performed the testing and ask them to confirm vulnerabilities and identify false positives This article is limited to SQL injection and cross-site scripting vulnerabilities and will aid you to ask the right questions to determine which vulnerabilities are real and how to fix them.
Wednesday, May 30, 2012
In the wake of frequent security breaches companies spend a lot of money and effort on prevention. From firewalls, intrusion prevention, intrusion detection, rogue wireless network detection to social media policies, corporate America is eager to implement the latest to prevent hackers from storming the castle. Preventive measures make a target harder to hit, the hacker may decide it is not worth the effort. Or, if the attempt is made, it will fail.
Data leakage concerns for sensitive information in files and using mechanisms such as classification
Friday, April 06, 2012
With the growing number of data and storage resources, many businesses face concerns regarding data leakage. There are many aspects of these resources which need to be managed including volume, high availability and the unique management based on which application that the data is associated with. In addition there are concerns about data leakage and rights protection to ensure that only the intended audience has access to the data.
Monday, April 02, 2012
The SecureWorld Expo in Boston hosted a number of industry speakers, among them six with titles indicating security of mobile or smart devices, illustrating the current concern and interest in this area.