Entries by Alan Zeichick

,

Edgescan loves to do what most people hate. Lucky you!

“If you give your security team the work they hate to do day in and day out, you won’t be able to retain that team.” Eoin Keary should know. As founder, director and CTO of edgescan, a fast-growing managed security service provider (MSSP), his company frees up enterprise security teams to focus on the more strategic, more interesting, […]

Why does the FTC spammer have an email address at my domain?

This is a good one. The spam message was short and sweet: From: Richard Kent email hidden; JavaScript is required Subj: You’ve been subpoenaed by the FTC. You’ve been subpoenaed by the FTC. FTC Subpoena Please get back to me about this. Thank you Richard Kent Senior Accountant email hidden; JavaScript is required The words […]

,

No honor: You can’t trust cybercriminals any more

Once upon a time, goes the story, there was honor between thieves and victims. They held a member of your family for ransom; you paid the ransom; they left you alone. The local mob boss demanded protection money; if you didn’t pay, your business burned down, but if you did pay and didn’t rat him out […]

, ,

Four ways enterprise IT can reduce mobile risk

From company-issued tablets to BYOD (bring your own device) smartphones, employees are making the case that mobile devices are essential for productivity, job satisfaction, and competitive advantage. Except in the most regulated industries, phones and tablets are part of the landscape, but their presence requires a strong security focus, especially in the era of non-stop […]

, , ,

Blindspotter: Big Data and machine learning can help detect early-stage hack attacks

When an employee account is compromised by malware, the malware establishes a foothold on the user’s computer – and immediately tries to gain access to additional resources. It turns out that with the right data gathering tools, and with the right Big Data analytics and machine-learning methodologies, the anomalous network traffic caused by this activity can […]

, ,

Where’s the best Java coding style guide? Not at Oracle

For programmers, a language style guide is essential for helping learn a language’s standards. A style guide also can resolve potential ambiguities in syntax and usage. Interestingly, though, the official Code Conventions for the Java Programming Language guide has not been updated since April 20,1999 – back from long before Oracle bought Sun Microsystems. In fact, […]

,

Bald eagle at Canyon Lake, Arizona

What an amazing sight! We visited Canyon Lake, Arizona — a short drive from our home in Phoenix — and were rewarded with a close-up of this bald eagle. The bird seems to have caught prey; we believe it was a smaller bird, since we could see feathers flying. These were shot using a Canon EOS […]

, , , , ,

Medical devices – the wild west for cybersecurity vulnerabilities and savvy hackers

Medical devices are incredibly vulnerable to hacking attacks. In some cases it’s because of software defects that allow for exploits, like buffer overflows, SQL injection or insecure direct object references. In other cases, you can blame misconfigurations, lack of encryption (or weak encryption), non-secure data/control networks, unfettered wireless access, and worse. Why would hackers go […]

, , , , , ,

Hackathons are great for learning — and great for the industry too

Are you a coder? Architect? Database guru? Network engineer? Mobile developer? User-experience expert? If you have hands-on tech skills, get those hands dirty at a Hackathon. Full disclosure: Years ago, I thought Hackathons were, well, silly. If you’ve got the skills and extra energy, put them to work for coding your own mobile apps. Do […]

,

May you be blessed

Today’s beautiful cactus flowers will be gone tomorrow. So much of our world’s wonders are ephemeral. Blink and you’ll miss the rainbow. A hug lasts mere seconds. A smile is fleeting. Shapes in the clouds constantly change. Take a moment to enjoy life. Stop and smell the roses, watch the butterflies dance, take delight in […]

, ,

Keep your business secrets safe with web filtering

Web filtering. The phrase connotes keeping employees from spending too much time monitoring Beanie Baby auctions on eBay, and stopping school children from encountering (accidentally or deliberately) naughty images on the internet. Were it that simple — but nowadays, web filtering goes far beyond monitoring staff productivity and maintaining the innocence of childhood. For nearly […]

,

People or programs: What’s the best for your synagogue?

This essay was originally published on the Reform Judaism blog on July 27, 2016. What is the most important part of your house of worship? Is it the spiritual well-being of the community or good attendance at adult classes and innovative programming events? That question is at the core – at the essence – of […]

IOC Approves Amateur Radio for Tokyo 2020 Olympic Games

CQ CQ CQ de IOC: The Organising Committee for the Tokyo 2020 Games have approved new competitions to celebrate Amateur Radio. Tokyo 2020 President Yoshiro Mori said, “The inclusion of Amateur Radio will afford athletes the chance of a lifetime to realise their dreams of competing in the Olympic Games – the world’s greatest sporting […]

, ,

5 things you should know about email unsubscribe links

Here’s a popular article that I wrote on email security for Sophos’ “Naked Security” blog. “5 things you should know about email unsubscribe links before you click” starts with: We all get emails we don’t want, and cleaning them up can be as easy as clicking ‘unsubscribe’ at the bottom of the email. However, some of those handy […]

,

A free BMW 7-Series car – and a check for $1.5 million!

Look what I fished out of my spam folder this morning. This is a variation on the usual lottery scam, and more enjoyable than most. But really, a BMW 760Li? While the 6.6-litre twin-turbo Rolls Royce engine would be zippy on Phoenix-area highways, we certainly don’t need the cold-weather package here. Anyway, the M4 two-door coupé is more […]