The security industry is ablaze with news about how PowerShell is being used by both commodity malware and attackers alike. Surely there’s got to be a way to defend yourself against these attacks!There absolutely is. PowerShell is – by far – the most securable and security-transparent shell, scripting language, or programming language available. Our recommendations are: […]
Cisco Announces Definitive Agreement to Acquire BroadSoft
Cisco is committed to delivering the next generation of collaboration experiences to all workers across every room, desk, pocket and application. These experiences include meetings, as well as messaging, calling capabilities and contact center touchpoints. As our customers continue to transition to the cloud, they are demanding deployment flexibility across all of these experiences. This […]
Microsoft: Cray Supercomputers are coming to Azure
I’m thrilled to share our new, exclusive partnership with Cray that will provide our customers unprecedented access to supercomputing capabilities in Azure to solve their toughest challenges in climate modeling, precision medicine, energy, manufacturing, and other scientific research. This announcement is yet another step to help our customers harness the power of HPC and AI […]
Banks Should Get Back to the Basics
Getting Back to Customer Service You don’t have to be living under a rock to know that banks and other financial institutions face challenges in adapting to an ever increasing regulatory environment. As a result of this compliance focus, one can make the case that banks are taking their eye off the ball. Perhaps the […]
Market-Based Sourcing and Beyond: Lookout for New State Tax Issues in the Corporate Tax World.
States are changing the way they calculate corporate income tax. Just when you thought you knew everything there was to know about multi-state corporate income tax apportionment, the states start switching up the rules! Nexus definition varies. For many years, corporate taxpayers could bank on a few understood conventions when figuring out their tax responsibilities […]
5 Ways to Secure Wi-Fi Networks
Wi-Fi is one entry-point hackers can use to get into your network without setting foot inside your building because wireless is much more open to eavesdroppers than wired networks, which means you have to be more diligent about security. But there’s a lot more to Wi-Fi security than just setting a simple password. Investing time […]
IoT privacy: 30 ways to build a security culture
Much work still must be done before the industrial and municipal Internet of Things (IoT) becomes widely adopted outside of the circle of innovators. One field, privacy, well understood by the public and private sector in the context of the cloud, PCs and mobile, is in the early stage of adaptation for the IoT. The […]
Unix: How random is random?
On Unix systems, random numbers are generated in a number of ways and random data can serve many purposes. From simple commands to fairly complex processes, the question “How random is random?” is worth asking. EZ random numbers If all you need is a casual list of random numbers, the RANDOM variable is an easy […]
The complexity of password complexity
Deploying password quality checking on your Debian-base Linux servers can help to ensure that your users assign reasonable passwords on their accounts, but the settings themselves can be a bit misleading. For example, setting a minimum password length of 12 characters does not mean that your users’ passwords will all have twelve or more characters. […]
Gravityscan, keeping WordPress sites safe
If your website, in common with roughly 25% of all websites, is running WordPress then it’s pretty much certain that it’s being constantly attacked. WordPress is to hackers what raw meat is to jackals because unless sites are assiduously maintained, they quickly become vulnerable to a huge number of exploits. The root cause of this […]