Author: Kerry Butters
-
Maintaining a Secure SDN
As technologies continue to evolve, the nature of IT infrastructure is changing. Virtualisation, hyper-convergence and increased connectivity are presenting fresh opportunities for malicious intruders to gain access to networks. One of the platforms presenting new possibilities to both network administrators and hackers is SDN. What is SDN? A software-defined network or SDN is an […]
-
Enterprise Applications of Artificial Intelligence
Much of our conception of Artificial Intelligence or AI has been shaped by popular movies: from the homicidal Red Queen of “Resident Evil”, to the J.A.R.V.I.S. operating system / virtual butler that provides logistical support to “Iron Man”. Extremely advanced intelligence and – in some cases – living machine consciousness. We’re not quite […]
-
Making Security an Integral Part of DevOps
In the rush to innovate, steal a jump on the competition, and bring new software products to market, enterprises have embraced the concept of DevOps: the peaceful co-habitation of Development and Operations, for more effective co-operation between the two. But this competitive frenzy often overlooks a vital aspect: security. In this article, we’ll […]
-
Making PCI Compliance Less Stressful
If your business requires you to deal with credit card holders, you’ll have records of your customers’ account details. Both your customers and you will want to know that this information is kept safe, and free from prying eyes. It’s not just good business practice; it’s the law. And complying with this legal […]
-
Your Cyber-Threat Assessment for 2016
The year just past saw several high-profile cyber-attacks hit the news, and brought the whole issue of cyber-security firmly into the spotlight. With the lessons still being learned from 2015 in mind, let’s look ahead to what you should be wary of in the months to come. Home is Where the Hurt Is? “Smart” domestic […]
-
Best Practices for Monitoring Windows Logins
Enterprise network administrators usually implement some security and access control measures over standard user accounts, but may neglect service accounts, which become vulnerable targets. As proof against threats from malicious users inside or outside the enterprise – and to comply with regulatory authorities – it’s essential to keep a close eye on what’s […]
-
Best Practices for Monitoring Microsoft IIS Web Server
If you’re working on a Microsoft Windows NT or 2000 platform, chances are you’ll be using Microsoft Internet Information Services (IIS) to build and administer your Web site, search engine, databases, and related applications. This guide will help you monitor and optimise your working environment. What is Microsoft IIS Web Server? Formerly known as Internet […]
-
Will Windows go Open Source?
At the ChefCon meeting in April of this year, engineer Mark Russinovich (Chief Technical Officer of Microsoft’s cloud computing platform, Azure) revealed to conference delegates that [in his words] “it’s definitely possible” that Windows could take the open source route. Eventually. “Definitely possible”. But is that all? A Closed Shop Traditionally, Microsoft Windows and […]
-
Best Practices for Monitoring Microsoft Exchange
If your scheduling and email services run on the Windows Server platform, chances are you’ll be using Microsoft Exchange. As a systems administrator, it’s your responsibility to make sure that things run smoothly. If you know what to watch out for, your job will be that much easier. This guide should help. What is Microsoft […]
-
How to Prepare for a DDoS Attack
With much of today’s commercial activity conducted via the Internet, it’s no wonder that corporate entities find themselves the target of assault by online intruders. Cyber-attacks are now an accepted part of life – and it’s up to administrators and security officers to establish how best to prepare and defend their organisations against them. […]