Linux Virtualization Provides Many Powerful Choices
I’ve been preparing Learning Tree’s brand-new course on Linux virtualization and I think people will really enjoy the exciting topic when it has its first public run later this month! This isn’t “How do I install Linux on VMware?” or “How do I install VMware on Linux?”, it is far more capable than either of […]
Disclosing Vulnerabilities In a Timely Manner
We’ve all seen buggy computer software: sometimes it’s a menu item that doesn’t work as expected, sometimes it’s a broken links, and sometimes it is a security vulnerability. Fortunately, there are far fewer of the latter than the former. Researchers and software designers have been working diligently to help ensure that software has fewer security […]
Why I Hate Security
You might think from all the posts I’ve done here and the classes I’ve taught about it that I love security. I do, sort of, and I hate it, sort of, too. I think this love-hate relationship is kind of healthy, though. So why do I hate it? Well, like most people I like closure. […]
A Presidential Executive Order for Cybersecurity: Now What?
The morning before his State of the Union Address, President Obama signed the executive order Improving Critical Infrastructure Cybersecurity. Good news — the U.S. Government is getting some needed leadership on the subject. Fearfully intoning “digital Pearl Harbor” over and over may be politically useful for congressmen, but accomplishes nothing. This order, on the other […]
How Much of Cloud Security is New and Different?
As far as cybersecurity technology goes, absolutely nothing is new or different about cloud security. Cloud security is based on precisely the same fundamental technology you should already be using in your in-house operation. The only difference is that you are turning over control, and thus visibility, of some of the operation to a cloud […]