Portrait of beautiful young woman using laptop while holding credit card at home

Has it really come down to a bag of chips?

A recent vending machine company had some of its POS systems compromised at waterparks in Wisconsin and Tennessee. This was a major breach…up to 40,000! Go figure. People can’t even buy some snacks or what not from a vending machine without having...

/ September 20, 2011
Modernization is the Key

Modernization is The Key

I had the chance to listen to the Chief Strategist of State Street Bank at the CIO 100 event. She was talking about the transformation of IT and the fact that State Street is constantly changing its IT infrastructure to match the...

/ August 30, 2011
Security Faux Pas

Security Faux Pas

Organizations and the press do a pretty good job of keeping the average person aware of the latest big technology vulnerability or exploit.  And yet, we still see some common mistakes people make that could make them a susceptible to being exploited....

/ August 12, 2011
Too Extreme I dont think so. Tying security to compensation

Too Extreme? I don’t think so. Tying security to compensation.

A colleague of mine recently posted a blog about the Black Hats getting the job done and rightfully so. Hackers have been pillaging the countryside lately. How many company compromises have there been over the last 3 months? More than there should...

/ August 8, 2011
Happy female shopper texting on her smart phone

Unique Requirements for Exchange 2010 Based Messaging Platform and Dependencies

In spite of the big inroads of various cloud based services in the messaging infrastructure space such as BPOS/Office 365, Google, many organizations continue to host their messaging infrastructure on-premise due to the unique nature of their requirements. Microsoft Exchange has made...

/ August 1, 2011
A red sphere linked with other grey: networking concept

Configuration Management with System Center

“Change is the only constant” is especially true in the Information Technology space. There are many drivers to changes in the IT infrastructure space including newer application, need for productivity improvements, service level management etc. As per Wikipedia – “Configuration management (CM)...

/ July 13, 2011
Closeup of photographer man holding and looking through circular polarizer filter

Keep living in a fantasy world…

It will never happen to us. We know what we are doing. We are too small to be a target. Besides, we have a firewall, intrusion detection system and some really talented people in place to protect us from these so-called hackers....

/ July 11, 2011
The Softer Side of Information Security

The Softer Side of Information Security…

I recently went to a presentation at Norwich University in Vermont. Tom Peters was the speaker. For those of you that don’t know or recall Tom Peters, he is the guy that wrote a book back in 1982 called “In Search of...

/ June 30, 2011
The Black Hats Get It. Do You

The Black Hats Get It. Do you?

Billions of dollars and countless person hours have been spent on securing everything from the data center to the “endpoint.” And now we hear about the new “endpoints” entering organizations due to Consumerization in the form of tablets, Smartphones, etc. While the...

/ June 30, 2011
A young Caucasian bank teller in front of the work station of a bank counter in a retail bank with a friendly smile. A portrait of the teller in the foreground with a woman banking customer standing in the background on the other side of the counter. Photographed in a horizontal format.

Advances and Limitations of Windows DHCP/DNS Services

Windows Server has offered DNS and DHCP as native services from the days of Windows NT 3.x. These services in Windows Server have evolved over the last decade and improved with additional features in every newer version of Windows. This blog provides...

/ June 21, 2011