Welcome! 

My new blog has been launched today. This is intended to be a compilation of musings and thoughts with a rough focus on security and privacy. The idea is to provide analysis, commentary and geekspeak translations of news, events, and happenings in the security and technology arenas.

Feel free to comment and reply, the idea is to dialog.

You can read new posts on this blog via the RSS feed.

-J-

Musings - Geek speak elucidations

Day 1 iPad 2 review: an Android geek's perspective

01/04/2012 10:37
  As an admitted Android fan who purchased a Motorola Xoom Android tablet the day it was released, and I was surprised by receiving a new iPad 2 for the holidays. Being what I consider to be a fair individual, I’m giving it a try and will compare and contrast… Day 1, first...

Scareware - Not a just a fashion statement anymore

04/05/2010 16:01
Scareware is the latest type of malware (MALicious softWARE) labeled by the media, not my poor sense of style. These are nasty little messages try to frighten you into browsing infected websites, installing infected software, and even giving up your credit card numbers. We have discussed this type...

Security Breach: the human factor

02/15/2010 13:51
A few weeks ago, it was reported that one of our local school districts was the victim of a security breach. This breach resulted in wire transfers totaling almost $3 million from their bank accounts to various foreign banks; reportedly 20% of the school's annual budget. While the school district...

Defensive Depths

02/01/2010 13:17
With the new year, it's time to get back to basics and review some key concepts in the security field. One term we often bandy about is "defense in depth" as a means to secure your information and it has nothing to do with deep sea warfare. The term is taken from military parlance and can be traced...

Budgeting for Disaster

12/01/2009 11:49
As the year winds to a close, thoughts are turning to the coming holidays: turkey, pies, snow shoveling, and perhaps a new budget. So how exactly does one plan for the unexpected, or budget for disasters? By definition disasters are very bad: bad enough that we should be insured against them....

Virtual security in a real world

11/20/2009 09:23
Virtualization has become a force to be reckoned with for organizations of all sizes and shapes. The flexibility and consolidation options available in virtualized environments give this technology an unusual distinction: it appeals to both the engineers and the accountants. But as with any new...

Avoiding the Storm Clouds

10/06/2009 10:58
As cloud computing becomes more commonplace and vital to our operations, it's imperative to keep in mind the security implications of running your business from “the cloud". Moving expensive and hard to maintain programs to the cloud can be an attractive  alternative to large one time...

Lock up your servers!

08/25/2009 15:44
One aspect often overlooked when securing our information is physical security. The goal of physical security is to control who can walk up to the information and touch it. The idea is to prevent unwanted information disclosure, loss, or corruption, the same as when securing the information across...

Untethered fun in the sun...

06/10/2009 14:49
As summer approaches, the dream of working while sitting on the beach comes to the fore. While I doubt many of us will be that lucky, the technology to enable this has been with us for some time and most of us use it every day: WiFi. WiFi (or Wireless Fidelity) is any of the widely deployed...

Social Insecurity

04/30/2009 10:29
Every day, our communications are becoming more interconnected. Whether it's receiving work and home email on your phone, updating your Linkedin status at work, or accessing work files from home, the line between home life and work life is more blurred than ever. While all of this interconnection...
<< 1 | 2 | 3 | 4 >>

Rants - Tech savvey explications

IE 0 Day Exploit

12/12/2008 19:27
Microsoft reported a new "zero-day exploit" that affects most versions of the Internet Explorer browser. A zero-day exploit is a security vulnerability that is being exploited before the software vendor or public know that the issue exists. This particular exploit attacks flaws within Internet...

Spoofed NDR issues

04/14/2008 13:05
We've seen a rash of NDR (non-Delivery Response) floods happening to our clients. In all cases, it appears that the spam being NDRed is spoofed, but we are receiving reports from these users that they are being black listed on spam filters. Is anyone else seeing this problem? Thanks, -J-