I’m thrilled to share our new, exclusive partnership with Cray that will provide our customers unprecedented access to supercomputing capabilities in Azure to solve their toughest challenges in climate modeling, precision medicine, energy, manufacturing, and other scientific research. This announcement is yet another step to help our customers harness the power of HPC and AI […]
Archives for 2017
Banks Should Get Back to the Basics
Getting Back to Customer Service You don’t have to be living under a rock to know that banks and other financial institutions face challenges in adapting to an ever increasing regulatory environment. As a result of this compliance focus, one can make the case that banks are taking their eye off the ball. Perhaps the […]
Market-Based Sourcing and Beyond: Lookout for New State Tax Issues in the Corporate Tax World.
States are changing the way they calculate corporate income tax. Just when you thought you knew everything there was to know about multi-state corporate income tax apportionment, the states start switching up the rules! Nexus definition varies. For many years, corporate taxpayers could bank on a few understood conventions when figuring out their tax responsibilities […]
5 Ways to Secure Wi-Fi Networks
Wi-Fi is one entry-point hackers can use to get into your network without setting foot inside your building because wireless is much more open to eavesdroppers than wired networks, which means you have to be more diligent about security. But there’s a lot more to Wi-Fi security than just setting a simple password. Investing time […]
IoT privacy: 30 ways to build a security culture
Much work still must be done before the industrial and municipal Internet of Things (IoT) becomes widely adopted outside of the circle of innovators. One field, privacy, well understood by the public and private sector in the context of the cloud, PCs and mobile, is in the early stage of adaptation for the IoT. The […]
Unix: How random is random?
On Unix systems, random numbers are generated in a number of ways and random data can serve many purposes. From simple commands to fairly complex processes, the question “How random is random?” is worth asking. EZ random numbers If all you need is a casual list of random numbers, the RANDOM variable is an easy […]
The complexity of password complexity
Deploying password quality checking on your Debian-base Linux servers can help to ensure that your users assign reasonable passwords on their accounts, but the settings themselves can be a bit misleading. For example, setting a minimum password length of 12 characters does not mean that your users’ passwords will all have twelve or more characters. […]
Gravityscan, keeping WordPress sites safe
If your website, in common with roughly 25% of all websites, is running WordPress then it’s pretty much certain that it’s being constantly attacked. WordPress is to hackers what raw meat is to jackals because unless sites are assiduously maintained, they quickly become vulnerable to a huge number of exploits. The root cause of this […]
8 ways to manage an internet or security crisis
Your business is hit with a ransomware attack. Or your ecommerce site crashes. Your legacy system stops working. Or maybe your latest software release has a major bug. These are just some of the problems that ecommerce, technology and other companies experience at one time or another. The issue is not if a problem – […]
Incident response is like tracking down a perpetrator
What is incident response? Image by Thinkstock Incident response is like investigating a real burglary. You look for evidence of the intruder at the crime scene, find his targets and his getaway car, and repair any holes. Discover any cuts in your chain link fence. Take a few steps back for more perspective. Find the […]