December 30, 2013

Managing Cyber Security Threats from Inside
In addition to NetFlow, security information and event management (SIEM) provides additional information about anomalous server or network behavior. SIEM solutions gather logs from various devices and systems, aggregating them into a correlation server. An event correlation application then mines unusual patterns or patterns known to be related to malicious behavior. Questionable activity is reported to security via email, SMS, or a Web portal.

Breaking down an IPv6 address: What it all mean
Let’s take a long hard look at an IPv6 address. Amazon supply IPv6 addresses with their EC2 cloud computers. ... There’s a lot of meaning packed into that strange-looking identifier. A few companies have tackled IPv6 but to most it’s just plain confusing. Why is it so confusing? And how can you decipher what it means? Connect to your AWS EC2 instance, find your network interface and its IPv6 address, and let’s do some serious IPv6 breakdown.

Introducing Enhanced Mitigation Experience Toolkit (EMET) 4.1
Many customers across the world now include EMET as part of their defense-in-depth strategy and appreciate how EMET helps businesses prevent attackers from gaining access to computers systems. Today, we’re releasing a new version, EMET 4.1, with updates that simplify configuration and accelerate deployment. EMET anticipates the most common techniques adversaries might use and shields computer systems against those security threats.

Software License Audits: Myths, Facts, and Microsoft
In this report, you’ll learn how ITAM and SAM in the Cloud “reboot” Microsoft software license audit preparation. By “reboot,” we mean shuttering some processes, optimizing others, erasing the problem, and starting a fresh new approach to audits. You’ll get a step-by-step action plan to prepare for an audit now. and you’ll learn the specific areas in which ITAM and SAM on the Cloud slash time- to-compliance-position while increasing accuracy and reducing organizational angst. With the ease, speed, and agility provided by Cloud-based ITAM and SAM, Microsoft audits become just “sheep in wolves’ clothing.”

Top 5 IT security webinars in 2013
2013 was the year IT security grew up. Leaks and prominent hacks were the focus for major news outlets and adoption of mobile and new targeted attacks were on the minds of IT security teams. ... The best IT security teams have moved from chasing security to proactively developing risk-based approaches and integrating their security practice with the business priorities of their organizations and the tools and services in the market have begun to reflect that. Without further ado, here are the top 5 IT security webinars in 2013:

Know your storage needs before installing a solid-state drive
With SSDs, Martin said, different drives are suited to different workloads, so it is important to select the right drive for your organization's needs. "SSDs, random, sequential, depending on the make, some of them are better than others, some it's the other way," he said. "It's a different animal." And, he noted, hard disk drives do well with sequential reads. So, depending on the workload, traditional disk may suit your needs.

2013: The tech year in cartoons
From Tim Cook's 'pay cut' to Steve Ballmer's 'retirement,' here's a look at some of the year's biggest IT stories from the pen of Computerworld's editorial cartoonist, John Klossner.

Carey Smith, on Becoming the Team’s ‘Hyperlink’
"I’m sort of a peripatetic manager, and I sometimes describe myself as a “hyperlink.” I have an office, but most of the time I just walk around and try to determine if we’ve got any problems. It might be a minor thing, but I’ll take that and then try to track it back. Sometimes you step on people’s toes, but the point is that everything and everybody are connected in some fashion. And they’re connected, if nothing else, through me doing this sort of thing."

Meet Business Demands by Making BI Effective and Relevant
To realize the full value of BI, businesses need to acknowledge how a solution fits with key business processes. The goal is to equip business users with consistent and specific information throughout all levels of the organization so each group or business unit can best understand and apply the information. The full spectrum of users—from the executive team to line-of-business managers—can use solutions that are relevant to their day-to-day responsibilities.

What does it take to transform an organization before a crisis hits
What can leaders do before the depth and scope of their companies’ crises come into focus? How can they initiate major transformations proactively? As researchers and managers who have been involved in numerous corporate transformations in recent years, we have learned that applying standard formulae to corporate transformations is, at best, ineffective and, at worst, dangerous. What’s needed is a new approach that enables executives to transform organizations proactively without resorting to fear.

Quote for the day:

"You cannot tailor-make the situations in life but you can tailor-make the attitudes to fit those situations." -- Zig Ziglar

No comments:

Post a Comment