IT Trenches:

Monitoring


September 19, 2008  12:53 PM

Did you see this? – Encyclopedia of internal network security threats



Posted by: Troy Tate
antivirus, awareness, botnet, Browsers, Data security, design, Firefox, forensics, homeland security, honeypot, malware, man-in-the-middle, Microsoft, Microsoft Windows, Monitoring, Networking, Policy, reporting, research, risk, Security, tools, troubleshooting, vulnerability, web, website, WWW

Promisec has released an online encyclopedia of internal network security threats. This is available online for free. There is a lot of information to look through and decide how the risks affect your organization. Take...

September 8, 2008  4:49 PM

Did you see this? – 2007 Web Application Security Statistics Project



Posted by: Troy Tate
awareness, data loss, Data security, Database, DataManagement, Development, internet, malware, Metrics, Monitoring, Policy, research, risk, Security, tools, vulnerability, web, website, WWW


September 2, 2008  6:22 PM

Operation Sentinel – Manhattan becomes “Big Brother”



Posted by: Troy Tate
awareness, blog, Data security, dhs, homeland security, Monitoring, Policy, policy enforcement, Security

Hopefully you have read my previous blog entry about IT Equipment Search & Seizure at US Borders. Well, if that is not enough to make you think Big Brother is here...


August 21, 2008  8:08 PM

IT Equipment search & seizure at the US borders



Posted by: Troy Tate
administration, awareness, blog, CIO, data loss, Data security, DataManagement, design, forensics, government, intellectual property, internet, IT education, Mobile, Monitoring, Networking, online identity, Policy, policy enforcement, reporting, research, risk, Security, WAN

I have recently been hearing some rumblings about this issue. I work for a firm with international locations and have travelled out of the country myself. So, this is a personal issue. What I am referring to is the situation described in this article by David Jonas of The Transnational:


August 18, 2008  7:24 PM

Did you see this? – Online tools/tutorials – RingOfSaturn



Posted by: Troy Tate
administration, awareness, DataCenter, DataManagement, design, diagnostics, howto, internet, IT education, LAN, malware, Metrics, Monitoring, network analysis, Networking, online identity, packet capture, Performance, reporting, research, risk, Security, Storage, tools, troubleshooting, VoIP, WAN, web, website, wireshark, WWW

Ok, I admit it. I'm a network tool junkie. I constantly look for neat tools to perform tasks in the easiest manner possible and give me reliable information. This website from RingofSaturn.com is definitely one of the cooler online...


August 18, 2008  7:11 PM

Did you see this? – Boot CD tutorial



Posted by: Troy Tate
administration, antivirus, bootcd, DataCenter, DataManagement, diagnostics, forensics, howto, Microsoft, Microsoft Windows, Mobile, Monitoring, packet capture, Performance, recovery, research, risk, Security, tools, troubleshooting

How often have you needed to recover a Windows system or use some type of boot disk? It's not easy to create a bootdisk in the current versions of Windows (XP or Vista). There's still a need for this capability. One source of how-to information can be found on the


August 18, 2008  7:04 PM

Moving a datacenter – one weekend – DONE!



Posted by: Troy Tate
administration, CIO, DataCenter, design, facility, facility management, internet, LAN, Monitoring, network analysis, Networking, Performance, risk, troubleshooting, WAN

Well, another busy month here. Last month we moved more than 2000 users from 6 different e-mail systems to a single e-mail platform. This month we moved a factory facility...


August 14, 2008  2:58 AM

Managing risk & vulnerability



Posted by: Troy Tate
administration, antivirus, awareness, CIO, Data security, DataCenter, DataManagement, design, forensics, honeypot, IT education, malware, Monitoring, Policy, policy enforcement, risk, Security, vulnerability

Jotting some quick thoughts here after answering a user post. Thought I would place the same information here for all to see. This list is by no means complete and your thoughts are always welcome. Some ways to measure risk include: How valuable is the asset? How much of a threat...


July 17, 2008  2:10 PM

Did you see this? – Microsoft Security Compliance Management Accelerator toolkit



Posted by: Troy Tate
Data security, DataCenter, design, Metrics, Microsoft Windows, Monitoring, policy enforcement, reporting, Security, tools

Monitor the security compliance state of your IT environment for computers running Windows.

In today’s IT environment, the ability to comply with regulations and industry standards, such as the...


July 2, 2008  2:33 PM

Did you see this? – The Great SPAM diet results are in



Posted by: Troy Tate
anti-virus, antivirus, awareness, botnet, Data security, email, malware, Metrics, Monitoring, online identity, Performance, reporting, research, Security, spam

See my previous post on The Great SPAM Diet. The results are now in and darkReading has the...

Bookmark and Share     0 Comments     RSS Feed     Email a friend


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: