IT Trenches:

CIO


October 1, 2008  8:03 PM

Financial Crisis & Technology Accelerators



Posted by: Troy Tate
administration, analysis, awareness, blog, financial analysis, government, homeland security, Metrics, risk, threshold, Wall Street, website

We all know that things in the US economy are bad right now. Looking back we wonder if anyone was thinking ahead and thinking "what-if" and managing the risk. Apparently no one was doing that and here we are today with the government working on a $700 billion bailout for some critical financial...

September 30, 2008  1:34 PM

Did you see this? – Laura Chappell’s Troubleshooting & Security Summit



Posted by: Troy Tate
awareness, Data security, DataManagement, education, forensics, honeypot, howto, LAN, malware, Metrics, Monitoring, network analysis, Network TAPs, Networking, packet capture, Performance, performance monitoring, reporting, research, risk, Security, SSL, toolkit, tools, troubleshooting, WAN, wireshark

Maybe you already know Laura Chappell (The Viral Bitgirl), if not then this is your chance to meet her and gain loads of knowledge in 2 days. On November 4-5, 2008 - Las Colinas, TX...


September 24, 2008  2:07 PM

Did you see this? – Using Microsoft Excel for business functions



Posted by: Troy Tate
administration, CIO, financial analysis, howto, Microsoft, Microsoft Excel, Microsoft Windows, toolkit, tools

Came across a great free toolset for Excel today. It is called the Business Functions toolset. Here's the PCWorld Editor's review on the toolset:

Looking to use Excel to run your business? Then you'll want this free add-in, which has 500 new functions to help with just...


September 19, 2008  12:53 PM

Did you see this? – Encyclopedia of internal network security threats



Posted by: Troy Tate
antivirus, awareness, botnet, Browsers, Data security, design, Firefox, forensics, homeland security, honeypot, malware, man-in-the-middle, Microsoft, Microsoft Windows, Monitoring, Networking, Policy, reporting, research, risk, Security, tools, troubleshooting, vulnerability, web, website, WWW

Promisec has released an online encyclopedia of internal network security threats. This is available online for free. There is a lot of information to look through and decide how the risks affect your organization. Take...


September 11, 2008  4:36 PM

RANT: Am I responsible for training technology staff at other companies?



Posted by: Troy Tate
administration, awareness, blog, CIO, Data security, DataCenter, DataManagement, design, Firewalls, Networking, Policy, policy enforcement, risk, Security, WAN

You may have seen in one of my past blog posts that we relocated a site over a weekend. As a result of that move we are continuing to clean-up various network access issues for...


September 8, 2008  4:49 PM

Did you see this? – 2007 Web Application Security Statistics Project



Posted by: Troy Tate
awareness, data loss, Data security, Database, DataManagement, Development, internet, malware, Metrics, Monitoring, Policy, research, risk, Security, tools, vulnerability, web, website, WWW


September 3, 2008  7:28 PM

Did you see (listen to) this? – Podcast on preventing spam



Posted by: Troy Tate
administration, anti-virus, awareness, Data security, DataManagement, email, Exchange, howto, internet, IT education, Metrics, Performance, podcast, Policy, reporting, risk, Security, spam, tools

An audio podcast on how SPAM is generated along with an examination on the frameworks and technologies that help manage and reduce SPAM. This may be a great tutorial for you and/or your users. CERTStation Media -...

Bookmark and Share     0 Comments     RSS Feed     Email a friend


August 22, 2008  8:02 PM

Poor Spelling = Identity Lost



Posted by: Troy Tate
administration, awareness, blog, Browsers, CA, certificate authority, design, forensics, howto, intellectual property, malware, man-in-the-middle, MITM, network analysis, Networking, online identity, reporting, risk, Security, SSL, vulnerability, web, website, WWW

Well, I am not the best speller and I know that is true for most people. I have recently discovered how this human weakness can get you into trouble and cause identity loss as well as potential financial loss. This issue has recently come to light with some of the Black Hat presentations. The...


August 22, 2008  3:46 PM

Trolls on ITKE – I think not!



Posted by: Troy Tate
administration, awareness, blog, CIO, design, intellectual property, internet, IT education, Networking, online identity, reporting, risk, Security, web, website, WWW

Here's an interesting blog entry I came across this week. I have great respect for John Postel mentioned in the article. He...


August 21, 2008  8:08 PM

IT Equipment search & seizure at the US borders



Posted by: Troy Tate
administration, awareness, blog, CIO, data loss, Data security, DataManagement, design, forensics, government, intellectual property, internet, IT education, Mobile, Monitoring, Networking, online identity, Policy, policy enforcement, reporting, research, risk, Security, WAN

I have recently been hearing some rumblings about this issue. I work for a firm with international locations and have travelled out of the country myself. So, this is a personal issue. What I am referring to is the situation described in this article by David Jonas of The Transnational:


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: