Comments
-
Good read. I have to agree about storage being number one catalyst behind application failures. At least that is the case in my shop.
-
Your list is spot on. Change management is critical to our daily operations.
-
Thanks for the write up.
-
Well written post. Although there are ways to monitor and detect data exfiltration, this doesn't seem to be common place. The common mentality to to throw hardware solutions at the boundary call yourself secure. A check in the check box does not a secure network make.
-
For me it was HP 755's running HP_UNIX, communicating on Thicknet front end LAN and Thinnet on the back end LAN.
-
I only got to vote on the Play in round and I am seeing the same thing.
-
The anticipation is killing me.
-
Oh no! Allowing manufacturers to remotely disable anything purchased from them has the smell of Big Brother.
-
Gave me the motivation to knock the rust off m inner poet.
-
Works better if there are fewer teams. To do everything listed for our team, Security needed syslog servers deployed. - Network team The storage team would need to provision the capacity for these servers. - Network team The virtualization team would need to deploy the servers. - Network team The networking team would need…
-
Great streams of network traffic Like a river flows, What swims below the surface We may never know. To pull fish from the river A net we will choose, To pull packets from the network NetFlow is what we use.
-
CMD or Powershell, makes no difference to me. As long as I can script, it doesn't matter where I do it.
-
Yes. We hold regular training classes with our teams and upper management of other teams to demonstrate the interface and ease of use.
-
rschroeder this rocks! You're setting the standard quite high!
-
Datafires are contained by boundary firewalls and host based firewalls are excellent at suppressing localized datafires. Definitely a Class Delta fire.
-
Music artists. Pick four genres. The best of each genre will meet in the final four.
-
Good write up on the textile industry.
-
Love reading Bruce Schneier.
-
The lack of cybersecurity training at top computer science programs is disconcerting. Perhaps they feel it is beneath them and leave it to the IT programs to address?
-
I always, freely offer up my opinion.
-
Once again, not something the DoD will ever put on a classified network.
-
Cool beans! Thank you.
-
Solid idea! Love it!
-
Thanks DanielleH
-
Good write up.
-
Congrats to the winners.
-
Awesome movie and awesome write up.
-
When you can speak intelligently about something that is designed intelligently, marketing just got easier.
-
Know what it is that you want to automate. Don't automate just for automation's purpose.
-
Optimize where possible, always looking for the most bang for the buck.