November 03, 2012

Hitting back at cyberattackers: Experts discuss pros and cons
The questions are being asked more often: When a cyberattack hits your network, is it right to launch a counter-attack of some type to try to at least identify the source if not stop it? Since the wheels of justice do indeed grind slowly, should frustrated IT professionals with security skills take matters into their own hands or hire others to do so?


Try the solid, configurable firewall distribution Sphirewall
Out of the box, you get advanced information for your network and traffic usage as well as the ability to glance at network traffic according to user, address, device, and much more. Unlike most Linux-based firewalls, Sphirewall doesn’t use iptables — it uses a kernel module that hooks into the packet stream and passes the packets to the Sphirewall core, which tracks and manages the packets based on user-configurable rules and events.


The Power of Persistence for Leaders
In the world of business leadership and entrepreneurship, persistence is often touted as one of the key success attributes. In a 2011 study conducted by professors at the University of Chicago Booth School of Business, persistence was found to be one of the strict criteria for successful CEOs.


jQuery Modal Dialog with Dynamic Content
Here is a demonstration of how to implement a jQuery dialog window (modal or normal) that can contain truly dynamic content, in which the contents are loaded from a totally different aspx/html page.


Back to Basics: Ensuring Strong BI Software Selection
Key differentiators that used to exist between vendor capabilities are becoming harder and harder to decipher, with branding and market penetration becoming a key factor in many software evaluations. Now, in software selection, time to value and scalability are becoming more important success factors than simply providing common features and functions out of the box.


Firefox to force secure connections for selected domains
To force secure connections between the browser and a server, Mozilla uses HSTS (HTTP Strict Transport Security), a mechanism used by servers to indicate that the connecting browser must use a secure connection, wroteMozilla's David Keeler in a blog post.


The Most Urgent Security Risks in 2012
The state of IT security is constantly shifting. Keeping up-to-date with the latest trends and practices is vital to protecting your organization. Faronics unveils the latest results of the State of IT Security Study conducted by the Ponemon Institute – a leading research authority on data security.


The Amazon Outage in Perspective: Failure Is Inevitable, So Manage Risk
The most recent Amazon Web Services outage left customers (and rival cloud providers) blaming Amazon. Instead, CIO.com columnist Bernard Golden says, everyone needs to accept that cloud computing is not immune to failure.


Google Wallet Gets Real
The Google Wallet Card is intended for circumstances when customers cannot use their software-based, mobile phone-bound Google Wallet, due to a merchant's lack of support for NFC payments.


Now, it's BYOA (bring your own application)
That's the prediction of Edwin Schouten, who points out that along with doing a lot of their work on their own smartphones, tablets or laptops, employees also will soon be selecting the application they are most comfortable with. "This is the whole 'app' culture nowadays," he points out. "Although everyone has a preference, which app you use does not matter, as long as it gets the job done."



Quotes for the day:

"Vision is a picture of the future that produces passion." -- Bill Hybels

"When your values are clear to you, making decisions becomes easier." -- Roy E. Disney

No comments:

Post a Comment