Musings - Geek speak elucidations

Virtual security in a real world

11/20/2009 09:23
Virtualization has become a force to be reckoned with for organizations of all sizes and shapes. The flexibility and consolidation options available in virtualized environments give this technology an unusual distinction: it appeals to both the engineers and the accountants. But as with any new...

Avoiding the Storm Clouds

10/06/2009 10:58
As cloud computing becomes more commonplace and vital to our operations, it's imperative to keep in mind the security implications of running your business from “the cloud". Moving expensive and hard to maintain programs to the cloud can be an attractive  alternative to large one time...

Lock up your servers!

08/25/2009 15:44
One aspect often overlooked when securing our information is physical security. The goal of physical security is to control who can walk up to the information and touch it. The idea is to prevent unwanted information disclosure, loss, or corruption, the same as when securing the information across...
<< 4 | 5 | 6 | 7 | 8 >>

Rants - Tech savvey explications

IE 0 Day Exploit

12/12/2008 19:27
Microsoft reported a new "zero-day exploit" that affects most versions of the Internet Explorer browser. A zero-day exploit is a security vulnerability that is being exploited before the software vendor or public know that the issue exists. This particular exploit attacks flaws within Internet...

Spoofed NDR issues

04/14/2008 13:05
We've seen a rash of NDR (non-Delivery Response) floods happening to our clients. In all cases, it appears that the spam being NDRed is spoofed, but we are receiving reports from these users that they are being black listed on spam filters. Is anyone else seeing this problem? Thanks, -J-

Welcome to the home of the Certifiable Technologist - Jason Appel

Welcome. This is an area dedicated to thoughts, comments, discussions, and musing on network/computer security, privacy, and technology... or anything else that looks interesting. The idea is to provide analysis, commentary and geekspeak translations of news, events, and happenings in the security and technology arenas.

You can read new posts on this blog via the RSS feed.



Keep in mind that this site is a work in progress

I am always interested in constructive critisism and suggestions, so feel free to comment.