Doug Vitale Tech Blog

May-June 2013 news archive

.

Better Home Networking Could Save $330 Million

IEEE Spectrum, 20 June 2013 – Most electronics, including laptops, smart phones and tablets, require an Internet connection. Our networking equipment — primarily modems, routers and cable/DSL gateways — which a majority of American homes now have, are also an energy drain. [More]


Now Available: Enhanced Mitigation Experience Toolkit (EMET) Version 4.0

Microsoft Security Blog, 17 June 2013 – EMET is a free mitigation tool designed to help IT Professionals and developers prevent vulnerabilities in software from being successfully exploited. The tool works by protecting applications via the latest security mitigation technologies built into Windows, even in cases where the developer of the application didn’t opt to do this themselves. [More]


Encrypting Your Email Works, Says NSA Whistleblower Snowden

Tech Crunch, 17 June 2013 – Snowden: “Encryption works. Properly implemented strong crypto systems are one of the few things that you can rely on. Unfortunately, endpoint security is so terrifically weak that NSA can frequently find ways around it.” [More]


Brocade releases new guide for SAN design and best practices

Brocade, 14 June 2013 – This document is a high-level design and best practices guide based on Brocade products and features, focusing on Fibre Channel SAN design. Covered topics include the early planning phase, understanding possible operational challenges, and monitoring and improving a SAN infrastructure. [More]


OWASP Releases New Top 10. Is That 9 Too Many?

Veracode Blog, 13 June 2013 – OWASP released its official Top 10 list for 2013 on Wednesday – the first major update to the oft-cited list of common web application vulnerabilities in three years. But with the new list come questions. Chief among them: has OWASP made a dent in the application security problem with its Top 10 list. And, if not, should we start thinking of new ways to wipe out the most common and troublesome web application vulnerabilities? [More]


Targeted Attacks Video Series

Microsoft Security Blog, 13 June 2013 – Microsoft has released a series of whitepapers that are designed to help organizations understand and manage the risk posed by targeted attacks by determined adversaries. In addition, we are publishing a short series of videos that introduce many of the topics covered in these papers. [More]


Microsoft Releases New Mitigation Guidance for Active Directory

Microsoft Security Blog, 3 June 2013 – As the bedrock for the corporate directory and identity, Active Directory plays a critical role in the IT environment, by providing access control for servers and applications. Against this backdrop and to help enterprises protect their Active Directory environments, Microsoft IT released a detailed technical reference document, “Best Practices for Securing Active Directory.” [More]


Why Global IP Traffic is Predicted to Grow Three-Fold

Business Technology Roundtable, 29 May 2013 – The latest Cisco Visual Networking Index Forecast (2012-2017) projects that global IP traffic will grow three-fold between 2012 and 2017. Global IP traffic (fixed and mobile) is expected to reach an annual run rate of 1.4 zettabytes ― more than a trillion gigabytes per year – by 2017. [More]


Sophisticated Hackers Can Crack Even The Most Secure Passwords

Red Orbit, 29 May 2013 – In the wake of last year´s password dumps and this year´s Twitter hacks, many have been paying extra attention to their passwords. The most common advice doled out is to use separate passwords for each website and service. Additionally, these passwords are supposed to be “strong,” meaning they combine letters, numbers and symbols and stay away from dictionary words. Criminals or trespassers who want to crack into your digital figurative backyard will always find a way, and according to a challenge posed by Ars Technica, to three hackers, even the strongest passwords — such as “qeadzcwrsfxv1331” — can be hacked if one has the proper amount of computing power behind them. [More]

Written by Doug Vitale

September 3, 2013 at 10:23 AM

%d bloggers like this: