What Cybersecurity Threats Do We Face In The Cloud?
Oct 31,
2018
Last week I wrote that compliance and complacency are major challenges in the cloud. Yes, defensive technology is the same. However, the cloud poses some specific threats. Multitenancy Multitenancy scares people the most. You share cloud infrastructure with other customers. Your cloud services are running on virtual machines. Those VMs run on shared hardware. You […]
cloud governance,
cloud sprawl,
compliance,
FedRAMP,
FISMA,
GDPR,
GLBA,
HIPAA,
hypervisor,
multitenancy,
NIST,
PCI,
PCI DSS,
shadow IT,
SOX,
speculative execution,
virtualization
What do Clocks, Cars, and Warships have in Common?
Jun 27,
2017
A few months ago we had Daylight Savings Time. My parents were delighted to discover that “the clock” in their car automatically adjusted itself, as did their computer. But now they had to change the two clocks in their bedroom, the two clocks in the kitchen, and several others around the house. How did the […]
What’s Happening To The CompTIA Security+ Exam?
Nov 2,
2016
I recently taught Learning Tree’s CompTIA Security+ test-prep course and a student asked a question I couldn’t answer. This wasn’t a technical question. If it had been, I would have known the answer or else I could have found it. But he asked: “Look, I do desktop support. I help set up and move desktop […]
certification exams tips and tricks,
CISSP,
Cloud Computing,
CompTIA,
phishing,
ransomware,
security,
SIEM,
SY0-401,
SY0-501,
UEFI,
virtualization
Using Linux Containers and Docker for Reliable Service
Apr 7,
2016
From time to time, I need to access the web server belonging to a company I do some work for. It’s only used by their employees plus consultants like me, so it’s pretty basic. Just enough to get the job done. The main page carries this warning: This web site will be down for maintenance […]
Avoid Graphical Slowdowns
Mar 1,
2016
The top program displays a constantly updated list of running processes ordered, by default, by CPU usage. The name comes from its intended use – display the processes that are the top users of system utilization. The joking explanation, is that it’s called “top” because it’s always at or near the top of its own […]