As summer rolls into fall, my kids are heading back to school. It’s always an interesting transition but this year even more so with my daughter going away to college for the first time. This has brought back a flood of memories from my own college education experiences.
I have always had a passion for education and have a strong belief in continous learning.
Today, so much is available on the web, through social media websites, and online video.
In the world of technology and government, there is so much more to learn every day. New technologies: cloud, cybersecurity and virtualization, new delivery methods: virtual classrooms, online video, and collaboration, and new government requirements and certifications.
Most large organizations and enterprises at least try to take security pretty seriously. This means that the front door is not only usually locked, it is fortified and reinforced. This makes it hard for the bad guys to get in. So, do they give up? Of course not! What they do instead is look around back and start rattling the door knobs on the shed and cellar and the servants entrance and try to work their way in that way.
High value targets are usually locked down and secured pretty well, but this is not always the case for lower value targets. Once compromised, these lower value targets can provide a useful platform from which to attack other systems. For example, while traffic from the internet to internal hosts may be tightly limited, in many cases traffic between machines in the DMZ may not be as well regulated. Thus if you can own one machine in the DMZ, it can be easier to compromise other systems.
A collaboration of four senior members of the Cisco IPS signature team recently culminated in the public release of a guide on writing custom signatures for Cisco IPS, the #1 IPS platform of the Internet. The idea behind this move is to give our customers an easier way to develop their own signatures, allowing them to more easily discover and block unwanted traffic in their networks. At the same time it helps in understanding existing signatures written by members of the IPS signature team.
DISA’s Customer & Industry Forum 2011 provides a valuable opportunity to see and hear how the latest technologies can help the Department of Defense better achieve its mission while introducing greater efficiencies at lower cost. Read More »
Stealing a quote from Arthur C. Clarke: “Any technology, sufficiently developed, is indistinguishable from magic”. Some people would certainly consider security these days as magic. Okay, so much for that reference, but what does Star Trek have to do with government and security, my typical topics. Star Trek, although mostly about exploration sure seemed to have a bit of a “Space Military” characteristic to it. Isn’t that what the Star Fleet was all about? (no offense intended, Capt. Kirk.)
Lately, I’ve been doing some research for a paper on the integration of physical and logical security (I did an initial paper that you can see here: Click on “The Necessity of Security”) and it dawned on me how very similar the technology of today is to the science fiction of the 1960’s, or in Mr. Clarke’s case, magic. So here is a synopsis of some of my observations. I’m sure there are more; please feel free to reply with what I’ve missed or your own favorites.