A client recently had a stream of attacks on several of their online applications. Thanks to excellent monitoring, solid architecture and nice, clean installations, the attacks were easily rebuffed. Cheers to all involved. Just the same, the attacks gave me some insights on what a typical attack vector looks like to an online intruder. There were certainly some patterns in the commands directed at each server or application. As I said, the client faired very well. However, the incident gave us an excellent opportunity to review our monitoring efforts and even more interesting, our security...
Packing Passwords
A common problem faced at the workplace and at home is finding a way to securely store your passwords. With people like “Anonymous” and identity thieves out there, gone are the days for scribbling passwords on post it notes (who would do such a thing?!?), or keeping word docs with your passwords listed on your hard drive. Users now want a more secure way to not only store passwords, but share them as needed.
Recently for a client site, we implemented Passpack (http://passpack.com/en/home/) as our online password repository, and so far, it...
Is your Organization Operationally Intelligent?
Data over here, Data over there, Data everywhere...
We live in an an age where there is probably more data compiled about a newborn child in it's first 1yr of life than was compiled about their great grand parent in their entire lives! Imagine collecting health data for the nearly 4.25M kids that are born in the US a year and then doing absolutely nothing with it. No studies on mortality rates, no studies on child development, no alerts on outbreaks effecting this new population...Nada. Preposterous? Yup. Ludicrous? U huh. Down right dumb? "It is decidedly so". Well...