I listen to NPR basically every time I'm in the car. Normally this gives me an ok sense as to what the rest of the world is thinking about. One show I am able to listen to regularly is “On Point”.
Why attack Twitter?
The recent high profile attacks on social networking sites such as Twitter and Facebook may give us a glimpse into the underground world of spammers, crackers, and those who style themselves as 'bot-herders'. As you're probably aware Twitter is a social networking site that allows users to generate short messages or 'tweets' which are then disseminated throughout the internet to a larger audience. The service started only a few years ago and since then its usage has exploded partly due to its high profile involvement in such recent events as the Iranian presidential election protests
Free silent business audit and forensic analysis
Last week we announced an exciting new offer for all businesses in the US – a free silent business audit with forensic analysis.
Prevolence of Botnets and Their Zombies Encourages Spam
Dark Reading published an article titled ” Booming Underground Economy Makes Spam A Hot Commodity, Expert Says ” regarding the ease of using botnets for spam activity and how this makes spamming profitable. Some of the more startling statistics show that “For about $10, [a spammer] can send a million emails”. Even if 2 people order a product that they are selling for $10, that's a 100% profit over the cost of the use of the botnet.
A Conversation on "Health Information Technology"
On Sunday, the Boston Globe printed a portion of a letter to the editor I sent in regards to one of the paper's articles. The opinion discussed the mandating of electronic health records and the importance of security for such records. Below is the complete letter.
Astaro Receives VMware Ready Certifications
Astaro earned multiple VMware Ready™ certifications for its security products. Astaro Security Gateway, Astaro Mail Gateway and Astaro Web Gateway have all been certified as VMware Ready, and Astaro is the only Unified Threat Management provider to have submitted to and passed VMware Ready validation.
Tips for securing your Wi-Fi Connection
Recently, NPR's “All Tech Considered” posted a very good and concise article on securing WiFi technology. I would just like to add a few key points for those that concern themselves with network security. First, when using a VPN on an un-trusted hotspot, make sure that it is a “full tunnel” VPN
Virtualization as a Disaster Recovery Strategy
There have actually been a few major disasters in the past 10 years that have shown the value of good disaster recovery plans. Though they're far from perfect they do make a difference and can always be improved with newer techniques and technology.
Spam Is More Than Annoying
Not only is it annoying having to sift through all the garbage which clogs your inbox, but it costs you productivity as you attempt to separate the mails you need from the unwanted items. Spam rarely ends up in my own inbox due to the effectiveness of the blocking solution I use, (I use a solution from Astaro ) but many of the people I speak with daily communicate that in an inbox with 50 messages, 45 or more can easily be spam on a given day.
Ideas are for sharing
We are rolling out a new service for our partners and customers – an improved feature request site. On this new site our partners and customers can make suggestions for improvements or request totally new functionality. Not only can visitors make their own suggestions – they can vote on the suggestions of others, giving us a better understanding of the popularity or urgency of specific network security needs