IT Trenches:

Security


October 3, 2008  7:59 PM

Did you see this? – Open Source Tools University



Posted by: Troy Tate
administration, analysis, anti-virus, blog, blogging, Data security, debugging, design, diagnostics, Firewalls, forensics, howto, internet, IT education, LAN, Metrics, Monitoring, network analysis, Networking, packet capture, Performance, performance monitoring, podcast, reporting, research, Sandbox, Security, SSL, toolkit, tools, troubleshooting, WAN, wireshark

If you are like me, you like those little goodie tools like nmap and wireshark that do something that is actually pretty complex but do it well and have a great following. I just came across this website that I am going to have to take some time to go through and find all of the nuggets it offers....

October 3, 2008  3:25 PM

Did you see this? – Six things you should do on a decreasing IT budget



Posted by: Troy Tate
Data security

Still stuck with lowering IT budgets and increasing costs? Hear Laura Chappel's six things you should do on a vanishing IT budget. See and listen to the presentation


September 30, 2008  1:34 PM

Did you see this? – Laura Chappell’s Troubleshooting & Security Summit



Posted by: Troy Tate
awareness, Data security, DataManagement, education, forensics, honeypot, howto, LAN, malware, Metrics, Monitoring, network analysis, Network TAPs, Networking, packet capture, Performance, performance monitoring, reporting, research, risk, Security, SSL, toolkit, tools, troubleshooting, WAN, wireshark

Maybe you already know Laura Chappell (The Viral Bitgirl), if not then this is your chance to meet her and gain loads of knowledge in 2 days. On November 4-5, 2008 - Las Colinas, TX...


September 19, 2008  1:16 PM

Crunching numbers – is this any way to manage a network?



Posted by: Troy Tate
administration, DataManagement, facility, facility management, howto, Metrics, Monitoring, network analysis, Performance, performance monitoring, reporting, toolkit, tools, WAN

I just got done catching up crunching wide area network usage statistics for the last 6 months. Wow... what a job! I should be doing it at the end of each month but I got behind due to other major activities like


September 19, 2008  12:53 PM

Did you see this? – Encyclopedia of internal network security threats



Posted by: Troy Tate
antivirus, awareness, botnet, Browsers, Data security, design, Firefox, forensics, homeland security, honeypot, malware, man-in-the-middle, Microsoft, Microsoft Windows, Monitoring, Networking, Policy, reporting, research, risk, Security, tools, troubleshooting, vulnerability, web, website, WWW

Promisec has released an online encyclopedia of internal network security threats. This is available online for free. There is a lot of information to look through and decide how the risks affect your organization. Take...


September 11, 2008  4:36 PM

RANT: Am I responsible for training technology staff at other companies?



Posted by: Troy Tate
administration, awareness, blog, CIO, Data security, DataCenter, DataManagement, design, Firewalls, Networking, Policy, policy enforcement, risk, Security, WAN

You may have seen in one of my past blog posts that we relocated a site over a weekend. As a result of that move we are continuing to clean-up various network access issues for...


September 8, 2008  4:49 PM

Did you see this? – 2007 Web Application Security Statistics Project



Posted by: Troy Tate
awareness, data loss, Data security, Database, DataManagement, Development, internet, malware, Metrics, Monitoring, Policy, research, risk, Security, tools, vulnerability, web, website, WWW


September 3, 2008  7:28 PM

Did you see (listen to) this? – Podcast on preventing spam



Posted by: Troy Tate
administration, anti-virus, awareness, Data security, DataManagement, email, Exchange, howto, internet, IT education, Metrics, Performance, podcast, Policy, reporting, risk, Security, spam, tools

An audio podcast on how SPAM is generated along with an examination on the frameworks and technologies that help manage and reduce SPAM. This may be a great tutorial for you and/or your users. CERTStation Media -...

Bookmark and Share     0 Comments     RSS Feed     Email a friend


September 2, 2008  6:22 PM

Operation Sentinel – Manhattan becomes “Big Brother”



Posted by: Troy Tate
awareness, blog, Data security, dhs, homeland security, Monitoring, Policy, policy enforcement, Security

Hopefully you have read my previous blog entry about IT Equipment Search & Seizure at US Borders. Well, if that is not enough to make you think Big Brother is here...


August 22, 2008  8:02 PM

Poor Spelling = Identity Lost



Posted by: Troy Tate
administration, awareness, blog, Browsers, CA, certificate authority, design, forensics, howto, intellectual property, malware, man-in-the-middle, MITM, network analysis, Networking, online identity, reporting, risk, Security, SSL, vulnerability, web, website, WWW

Well, I am not the best speller and I know that is true for most people. I have recently discovered how this human weakness can get you into trouble and cause identity loss as well as potential financial loss. This issue has recently come to light with some of the Black Hat presentations. The...


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: