Comments
-
Ditto. All questions answered and survey completed, but no e-mail.
-
I once worked on a legacy application that could not be replaced. It was home grown, using three different flavors of Oracle, used to document time spent on a multi-level maintenance process. That was twelve years ago. I bet it is still in use.
-
Today's link opens day 8. DanielleH
-
@"yumdarling" no questions?
-
Yes, security starts with awareness. User awareness, sysadmin/netadmin awareness, but most importantly management awareness. Good on ya referencing the NIST Cybersecurity Framework. My Cybersecurity professors drilled NIST into our heads. Now, even the DoD is heading in that direction.
-
20 years ago I would use a single 3.5" floppy to load anti-virus on a machine, and all of the current signatures. Times have changed.
-
Sometimes there appears to be light at the end of the tunnel.
-
Amazing how Conficker is still so prevalent. Good reads as usual. Really enjoyed the population map. Wondering if it will be updated for the election, considering all those who want to pull chocks because of the outcome.
-
Might be hard to work that one in.
-
Still working on implementing this
-
Great slide deck. Should be a must read.
-
Good read.
-
They do have a choice. They can work elsewhere. Not defending bringing them back without pay, but they are not slaves.
-
Agreed. No mention of licensing costs either.
-
Reminds me of my Navy instructor days.. Know the systems being taught so well, you can teach it at any level. Some students were really bright, others were more like granite.
-
but "train"ing is a good thing, right?
-
Same could be said about any "security product. They all need to be tuned for optimum performance. Unfortunately, some require extensive tuning just to be barely functional.
-
Ensure you have input from the application/server owners, and buy in from management.
-
As for the UK surveillance law, is this just big government overstepping their bounds, or just a necessity in the current fight against terrorism?
-
Good to see you're still around,
-
Excellent write up on the use filtering packets using flag bits. I haven't done that in a while. Time to add that tool back to the tool box. Thank you. I can't speak to all firewalls, but the McAfee firewall uses a proxy that will give different indications depending depending on the packet contents. If the port is not in…
-
How do you not normalize data used for public presentations?
-
That would do it.
-
Well written.
-
Well said. I concede.
-
It all comes down to trust. Do you trust someone else to drive, or do you prefer to drive yourself? People are unwilling to lose direct control of hteir data.
-
Speaking from a DoD perspective, loss of data control is a huge concern. Especially whan it come to putting warheads on foreheads. Data control is critical.
-
It important to know you learn. We are all different and respond to differently to various sensory input. One friend and coworker would take a Sybex or Cisco book and a fifth of Jim Beam, and over a weekend consume both of them. His retention of the material was amazing.
-
Kiwi is nice. Looking forward to fully implementing LEM.
-
Season two is coming this Summer