Putting air bags in a 1965 Mustang?

The new US CIO, Tony Scott addressed security concerns in federal IT, especially after the recent massive data breach at the Office of Personnel Management. He said the one of the biggest challenges is protecting old and outdated IT infrastructure systems, comparing it to trying to install air bags in a 1965 Ford Mustang. It's [...]

Open vs. closed appliances in your network

When it comes to putting an appliance in your network for out-of-band management, you want to think carefully about whether that appliance is based on an open or closed platform. It might just be the difference between locking up network security and being open for business for hackers. A Linux platform lends itself to building [...]

Config errors better than hackers?

The Facebook downtime event on January 27th, where an hour-long outage at Facebook cut off access to critical status updates worldwide in addition to Instagram posts and Tinder hook-ups, shows the sensitivity of large organizations to public perception of hacking threats. The Lizard Squad hacking group, which apparently took control of the Malaysia Airlines website [...]