Advances and Limitations of Windows DHCP/DNS Services

Windows Server has offered DNS and DHCP as native services from the days of Windows NT 3.x. These services in Windows Server have evolved over the last decade and improved with additional features in every newer version of Windows. This blog provides...

/ June 21, 2011

Don’t Panic Yet

The recent Lockheed Martin disclosure that it had thwarted a tenacious cyber-attack was an interesting headline, primarily because publicizing a failed attack is highly unusual.  More importantly, the “unauthorized” articles and leaks that appeared and pointed back to the theft of RSA...

/ June 7, 2011

Citrix Synergy 2011

The floor at the Moscone West Conference Center was swarming with Synergy Attendees. The day started with a session on BYO  Tablets, Computers and Smart Phones. The attendance at this session was impressive, a clear sign that many organizations are faced with...

/ May 26, 2011

First Time Offshoring?

The first time I heard the term First Time Offshoring  (FTO)  Akibia had just become a part of Zensar Technologies.  The reference is to a process that focuses on Zensar’s “ multi-stage methodology that recognizes that successful outsourcing needs equal emphasis on...

/ April 28, 2011

AFCOM Data Center World – Day 2

My experience on Day 2 of the AFCOM conference has oriented on datacenter operations process and financials.  As a general theme, IT managers are preoccupied with effective execution and managing costs.  A couple of observations: Discussions and presentations on the topic tend...

/ March 31, 2011

AFCOM Data Center World – Day 1

Zensar is exhibiting at the AFCOM Data Center show and I wanted to update everyone on what we are seeing. The show and the organization brings together a myriad of datacenter professionals, ranging from private, public (gov’t, education) and not for profits...

/ March 30, 2011

RSA SecurID Breach: Are Your Tokens Safe?

The news of a security breach at one of the world’s trusted security firms has raised concerns among companies across the globe. While RSA is not releasing the details around the breach at this time, which they have categorized as an “advanced...

/ March 21, 2011

You can outsource the work, but not the responsibility

Many organizations are under the impression that if they outsource their credit card transactions, then they are not responsible for their PCI compliance. While this may minimize the scope of the PCI environment, it does not alleviate the responsibility for their PCI...

/ February 21, 2011

P3 Cubed: Focus on the Basics Part III

From my previous discussions on the three P’s – Passwords, Patching and Ports, let’s talk finally about Ports. The Third P – Ports: Open TCP and UDP ports, especially open ports that are not required for business purposes, continue to be something...

/ January 21, 2011

P3 Cubed: Focus on the Basics Part II

Continuing from the previous discussion on the most significant areas of technical concern in the area of information security and assurance and the three P’s – Passwords, Patching and Ports, let’s talk next about Patching. 

/ January 21, 2011