Don’t Get Into Cloud with Just Anybody
Principle Network Security Architect, AT&TThe first users to embrace and benefit from cloud computing were malicious botnet operators. Consider some of the cloud innovations attributed to botnet...
View ArticleApps vs Oranges and the Occasional Bad Banana
Principle Network Security Architect, AT&TThe fruit section at our grocery store generally is doing their best to keep fresh and tasty produce in stock. However, there are occasions where some...
View ArticleFirewalls and Football
Principle Network Security Architect, AT&TNow that we are well into the fall football season, this is a good time to observe some of the things we can learn from football to develop a sound...
View ArticleStopping DNSChanger Trojans
Principle Network Security Architect, AT&TWe need to be conscious of the decisions we make that balance between better security and our freedom. We all accept the increasing physical security...
View Article8 Suggestions for Mitigating and Preventing DNSChanger Malware in your...
Principle Network Security Architect, AT&TThis is a follow-up to a previous blog that was titled “Stopping DNS Changer Malware on the Internet.” I have been receiving some questions from enterprise...
View Article7 Principles of a Sound Network Security Analysis Strategy
Principle Network Security Architect, AT&TAs threats become more creative, our means to discover them needs to be more creative as well. Everyone that is operating a large enterprise is struggling...
View ArticleBasic Requirements for any Network-Connected Device
Principle Network Security Architect, AT&TIn a couple of recent blog posts by Jim Boxmeyer (e.g., Help, I was Betrayed by my Cloud Enabled Smart Fridge!), he pointed out our trend toward more and...
View Article3 Days Until DNS Changer Deadline Hits
Principle Network Security Architect, AT&T This is a follow-up to a previous blog that was titled “Stopping DNS Changer Malware on the Internet.” I have been receiving some questions from...
View ArticleDon’t get spooked by the Ghost bug or other vulnerabilities
In our New Year, New Security Challenges webinar, we discussed how software vulnerabilities in open source software are now impacting a wide variety of products. The Ghost vulnerability is another...
View ArticleThe 10 Commandments of Enterprise Secuirty
<span>By Brian Rexroad </span> <span>I recently was asked if there are any guiding principles for creating an effective security program—the 10 (or so) commandments of security, so to...
View Article
More Pages to Explore .....