In our review of cryptographic algorithms, we will start with the Message-Digest, MD5 hashing algorithm. This isn’t because MD5 is “the best” or even “the first” (it’s certainly neither of those). In fact, it’s not technically an encryption algorithm at all. It is important though, as a precursor to other encryption algorithms we will talk…
As a part of the enterprise IT assessment process, and as a component for articulating the rationale for elevation of IT service capabilities to achieve alignment of IT with the strategic goals of the business, a description of the current level of IT maturity is a beneficial measure. ISACA is a global provider of information,…
Undoubtedly you’ve heard by now that Intel has a bid on the table to buy McAfee (for $7.7B). ¬†We’ve written before about the collaboration that’s been going on between the two companies for almost two years now, which we suspect is a leveraging of features at both ends of the stack to improve security of data processing devices. ¬†Indeed the two companies share a vision of combined secure hardware and software to protect the full spectrum of Internet connected devices.
So what does this mean for us chickens? ¬†Well, there’s quite a variety of opinion in the industry so far. ¬†The official company line(s) are of course that this will lead to technology that improves security for network connected devices of all types (something we certainly can benefit from), and of course that there is a great opportunity for more sales of security software if every new CPU is seen as an opportunity for that. ¬†However, there is a good bit of open endedness around this. ¬†We’ll at least give you our opinions.
We’ve just wrapped up day-one of this year’s Cloud Expo at the Javits Convention Center in New York City.¬† You know, it’s been nearly a year since I attended Cloud World in San Francisco, and over that period of time it surprises me how little new anyone is saying about cloud computing.¬† It borders on raining sophistry here at the cloud show, and definitions (and redefinitions) of IaaS, Paas, and SaaS are still being drilled into attendee’s heads.¬† Maybe the abundance of attendance is to be attributed to the possibility that the IT community is still sorting out architectural rationalization of cloud computing, but in my humble opinion it’s high time to move on to meatier food for thought.
It is notable to observe the number of businesses emerging to capitalize on the nuts and bolts issues that arise when an enterprise takes those first steps into a formal cloud computing scenario.¬† In that regard, one of the few “wow, now that’s cool” moments for me in the conference so far was an introduction to a company called Perspecsys.
There’s a piece by Jim Finkle in Reuters this morning about the rise in cybercrime in social networking sites.¬† The article mentions that MySpace had been plagued by this for several years, but now with the increasing popularity of Facebook, the criminals are going where the game is.
Per the article, “Facebook is the social network du jour. Attackers go where the people go. Always,” said Mary Landesman, a senior researcher at Web security company ScanSafe.
Scammers break into accounts posing as friends of users, sending spam that directs them to websites that steal personal information and spread viruses. Hackers tend to take control of infected PCs for identity theft, spamming and other mischief.“
The Internet is going mobile. ‚Big news, right? Well, with the open-access provisions attached to the auction of the 700 MHz spectrum, the continued success of open-source public VoIP applications, and open platforms such as Android and OpenMoko, things are really accelerating. The auction of the 700 MHz spectrum comes with the requirement that the…