Red Hat’s NetworkManager and Firewall Daemon — Nice Ideas, But Not For My Server
I have a suggestion that may look strange at first, but bear with me: Red Hat Enterprise Linux includes two core networking services that should be disabled. Red Hat provides two operating systems, Fedora and Red Hat Enterprise Linux or RHEL. My suggestion makes more sense when we consider how RHEL is developed. Both Fedora […]
What Happens When “Shadow IT” Goes Missing?
Last week I told about how a vulnerable cloud server was deployed, ignored, and then owned by an attacker, with Amazon catching this and the entire cycle complete in just over two weeks. It had an obvious cause: skipping part of the process in which unneeded cloud resources are shut down. But I said that […]
Microsoft Windows Azure Makes Some Big Jumps Forward With FedRAMP and Barracuda
Microsoft’s Windows Azure product line first appeared in 2008. When I first learned about it, I concluded that it was a nice complement to Amazon Web Services and an alternative or competitor to Google’s cloud services. Windows Azure let you develop and run your applications in a PaaS space, analogous to Google App Engine but […]
New course on Protecting Your Perimeter
I spoke earlier this week to the author of Learning Tree’s new course (2010) Defending The Perimeter From Cyberattacks: Hands-On, Adrian Brian. Adrian and I have been friends for many years and when he told me he had just written this new course, I wanted to share it with you right away. This course addresses […]