IT Trenches:

reporting


September 19, 2008  12:53 PM

Did you see this? – Encyclopedia of internal network security threats



Posted by: Troy Tate
antivirus, awareness, botnet, Browsers, Data security, design, Firefox, forensics, homeland security, honeypot, malware, man-in-the-middle, Microsoft, Microsoft Windows, Monitoring, Networking, Policy, reporting, research, risk, Security, tools, troubleshooting, vulnerability, web, website, WWW

Promisec has released an online encyclopedia of internal network security threats. This is available online for free. There is a lot of information to look through and decide how the risks affect your organization. Take...

September 3, 2008  7:28 PM

Did you see (listen to) this? – Podcast on preventing spam



Posted by: Troy Tate
administration, anti-virus, awareness, Data security, DataManagement, email, Exchange, howto, internet, IT education, Metrics, Performance, podcast, Policy, reporting, risk, Security, spam, tools

An audio podcast on how SPAM is generated along with an examination on the frameworks and technologies that help manage and reduce SPAM. This may be a great tutorial for you and/or your users. CERTStation Media -...

Bookmark and Share     0 Comments     RSS Feed     Email a friend


August 22, 2008  8:02 PM

Poor Spelling = Identity Lost



Posted by: Troy Tate
administration, awareness, blog, Browsers, CA, certificate authority, design, forensics, howto, intellectual property, malware, man-in-the-middle, MITM, network analysis, Networking, online identity, reporting, risk, Security, SSL, vulnerability, web, website, WWW

Well, I am not the best speller and I know that is true for most people. I have recently discovered how this human weakness can get you into trouble and cause identity loss as well as potential financial loss. This issue has recently come to light with some of the Black Hat presentations. The...


August 22, 2008  3:46 PM

Trolls on ITKE – I think not!



Posted by: Troy Tate
administration, awareness, blog, CIO, design, intellectual property, internet, IT education, Networking, online identity, reporting, risk, Security, web, website, WWW

Here's an interesting blog entry I came across this week. I have great respect for John Postel mentioned in the article. He...


August 21, 2008  8:08 PM

IT Equipment search & seizure at the US borders



Posted by: Troy Tate
administration, awareness, blog, CIO, data loss, Data security, DataManagement, design, forensics, government, intellectual property, internet, IT education, Mobile, Monitoring, Networking, online identity, Policy, policy enforcement, reporting, research, risk, Security, WAN

I have recently been hearing some rumblings about this issue. I work for a firm with international locations and have travelled out of the country myself. So, this is a personal issue. What I am referring to is the situation described in this article by David Jonas of The Transnational:


August 18, 2008  7:24 PM

Did you see this? – Online tools/tutorials – RingOfSaturn



Posted by: Troy Tate
administration, awareness, DataCenter, DataManagement, design, diagnostics, howto, internet, IT education, LAN, malware, Metrics, Monitoring, network analysis, Networking, online identity, packet capture, Performance, reporting, research, risk, Security, Storage, tools, troubleshooting, VoIP, WAN, web, website, wireshark, WWW

Ok, I admit it. I'm a network tool junkie. I constantly look for neat tools to perform tasks in the easiest manner possible and give me reliable information. This website from RingofSaturn.com is definitely one of the cooler online...


July 25, 2008  12:58 PM

I know who I am – Do you know my name?



Posted by: Troy Tate
administration, awareness, blogging, Browsers, Database, DataCenter, DataManagement, design, Development, email, Exchange, Exchange 2007, howto, internet, Microsoft Windows, online identity, Policy, policy enforcement, reporting, research, Security, subscriptions, troubleshooting, website, wiki, WWW

If you read my previous post then you know we recently went through a major e-mail system migration. Part of that e-mail migration included moving from various naming...


July 17, 2008  2:10 PM

Did you see this? – Microsoft Security Compliance Management Accelerator toolkit



Posted by: Troy Tate
Data security, DataCenter, design, Metrics, Microsoft Windows, Monitoring, policy enforcement, reporting, Security, tools

Monitor the security compliance state of your IT environment for computers running Windows.

In today’s IT environment, the ability to comply with regulations and industry standards, such as the...


July 8, 2008  5:12 PM

Browser warnings – Danger Will Robinson! – or did it just cry “Wolf!”?



Posted by: Troy Tate
anti-virus, antivirus, awareness, botnet, Data security, Development, Firefox, forensics, Google, honeynet, honeypot, IT education, malware, Metrics, online identity, Policy, policy enforcement, reporting, Security, web, website, WWW

I sometimes browse the internet using Firefox. I say sometimes because Internet Explorer is the standard browser at my company and Firefox is not supported by IT. Well, since I work in IT, sometimes you have to test things on behalf of users and also to see how certain sites are different depending...


July 2, 2008  2:33 PM

Did you see this? – The Great SPAM diet results are in



Posted by: Troy Tate
anti-virus, antivirus, awareness, botnet, Data security, email, malware, Metrics, Monitoring, online identity, Performance, reporting, research, Security, spam

See my previous post on The Great SPAM Diet. The results are now in and darkReading has the...

Bookmark and Share     0 Comments     RSS Feed     Email a friend


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: