You normally would expect the summer to be a quiet period, even for the IT industry. But market dynamics just won’t allow it so it would seem, at least when in comes to the SDS/HCI space. Apart from new software releases there was also the occasional company-related news that made the headlines during the summer […]
New VMware KB articles published for week ending 29th October 2017
VMware ESXi Virtual machine panics with ‘Unexpected Signal’ errorDate Published: 2017/10/23 PCI Passthrough does not work for Virtual Machine with Linux kernel 4.2 and aboveDate Published: 2017/10/23 VM randomly stuck sometimes and issues host based VSCSI resetDate Published: 2017/10/25 Virtual machine fails to power on with the error “msg.vmk.status.VMK_MEM_ADMIT_FAILED”Date Published: 2017/10/25 OVF deployment from Content […]
Microsoft: Defending Against PowerShell Attacks
The security industry is ablaze with news about how PowerShell is being used by both commodity malware and attackers alike. Surely there’s got to be a way to defend yourself against these attacks!There absolutely is. PowerShell is – by far – the most securable and security-transparent shell, scripting language, or programming language available. Our recommendations are: […]
5 Ways to Secure Wi-Fi Networks
Wi-Fi is one entry-point hackers can use to get into your network without setting foot inside your building because wireless is much more open to eavesdroppers than wired networks, which means you have to be more diligent about security. But there’s a lot more to Wi-Fi security than just setting a simple password. Investing time […]
IoT privacy: 30 ways to build a security culture
Much work still must be done before the industrial and municipal Internet of Things (IoT) becomes widely adopted outside of the circle of innovators. One field, privacy, well understood by the public and private sector in the context of the cloud, PCs and mobile, is in the early stage of adaptation for the IoT. The […]
Unix: How random is random?
On Unix systems, random numbers are generated in a number of ways and random data can serve many purposes. From simple commands to fairly complex processes, the question “How random is random?” is worth asking. EZ random numbers If all you need is a casual list of random numbers, the RANDOM variable is an easy […]
The complexity of password complexity
Deploying password quality checking on your Debian-base Linux servers can help to ensure that your users assign reasonable passwords on their accounts, but the settings themselves can be a bit misleading. For example, setting a minimum password length of 12 characters does not mean that your users’ passwords will all have twelve or more characters. […]
Gravityscan, keeping WordPress sites safe
If your website, in common with roughly 25% of all websites, is running WordPress then it’s pretty much certain that it’s being constantly attacked. WordPress is to hackers what raw meat is to jackals because unless sites are assiduously maintained, they quickly become vulnerable to a huge number of exploits. The root cause of this […]
8 ways to manage an internet or security crisis
Your business is hit with a ransomware attack. Or your ecommerce site crashes. Your legacy system stops working. Or maybe your latest software release has a major bug. These are just some of the problems that ecommerce, technology and other companies experience at one time or another. The issue is not if a problem – […]
Incident response is like tracking down a perpetrator
What is incident response? Image by Thinkstock Incident response is like investigating a real burglary. You look for evidence of the intruder at the crime scene, find his targets and his getaway car, and repair any holes. Discover any cuts in your chain link fence. Take a few steps back for more perspective. Find the […]