IT Trenches:

Firewalls

1

January 26, 2009  7:14 PM

Do you manage a firewall and want to find the source of malicious network activity? – Check out the Internet Malicious Activity Map



Posted by: Troy Tate
activity, Firewalls, graph, internet, malicious activity, malware, network, network security, research, Security, Subnet, WWW

For those of you who manage your own network, you have to consider the strength of the firewall at your network perimiter, the knowledge and skills of those who manage it. You also have to provide technology that can help protect your mobile users. Part of building that secure environment is...

January 19, 2009  8:13 PM

Skype users – does anyone use this on ITKE? – or is it overhyped?



Posted by: Troy Tate
Firewalls, Security, Skype, support, VoIP

Recently I posted a question about using Skype in a corporate environment. Based on the lack of any feedback, it really makes me wonder if Skype is an overhyped solution for corporate environments. I also posted the same questions to another professional mailing list I subscribe to and received...


December 3, 2008  3:50 PM

Holiday greeting cards, holiday shopping and computer security awareness



Posted by: Troy Tate
administration, anti-virus, antivirus, awareness, Browsers, data loss, Data security, education, Firefox, Firewalls, homeland security, IT education, malware, Microsoft, Microsoft Windows, online identity, phishing, risk, Security, spam, SSL, vulnerability


October 9, 2008  3:00 PM

Alternatives to e-mail attachments – SharePoint is risky!



Posted by: Troy Tate
administration, Data security, DataManagement, design, email, Exchange, Firewalls, intellectual property, Networking, Policy, policy enforcement, risk, Security, SharePoint, Storage, vulnerability, website

I'm looking for some help on this topic and have posted a question to the ITKE community. Hopefully someone out there has had some experience with this service for your...


October 3, 2008  7:59 PM

Did you see this? – Open Source Tools University



Posted by: Troy Tate
administration, analysis, anti-virus, blog, blogging, Data security, debugging, design, diagnostics, Firewalls, forensics, howto, internet, IT education, LAN, Metrics, Monitoring, network analysis, Networking, packet capture, Performance, performance monitoring, podcast, reporting, research, Sandbox, Security, SSL, toolkit, tools, troubleshooting, WAN, wireshark

If you are like me, you like those little goodie tools like nmap and wireshark that do something that is actually pretty complex but do it well and have a great following. I just came across this website that I am going to have to take some time to go through and find all of the nuggets it offers....


September 11, 2008  4:36 PM

RANT: Am I responsible for training technology staff at other companies?



Posted by: Troy Tate
administration, awareness, blog, CIO, Data security, DataCenter, DataManagement, design, Firewalls, Networking, Policy, policy enforcement, risk, Security, WAN

You may have seen in one of my past blog posts that we relocated a site over a weekend. As a result of that move we are continuing to clean-up various network access issues for...


1

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: