Logging, monitoring and alerting is probably the single biggest weakness that most organizations have. Office 365 is also likely the single biggest vulnerability. So what actions should you be monitoring in Office? According to AT&T’s Alien Vault division, here is the answer. User access – who is there normally; what is your user baseline. Are […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Cisco: Critical Bug Allows Remote Takeover of Routers Cisco rated this bug 10 out of 10. For users of Cisco 4000 series ISRs, ASR 1000 series aggregation routers, 1000v cloud routers and integrated services virtual routers, an unauthenticated user can gain full control just by sending a malicious HTTP request. So yet another reminder that […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
A recent incident at Amazon US East-1 in Virginia is a good reminder about protecting your data. On August 31st at 4:33 AM the datacenter lost power and the generators kicked in, but at 6:00 AM, the generators started failing. The result of that was that 7%+ of the AWS EC2 instances failed and some […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Most people don’t know what DNS is, but it is almost as old as the Internet and you use it hundreds of times a day, probably thousands of times a day. Every time you check for new email on your phone or browse to a web site, you are using DNS. The Internet uses numeric […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
The U.S. Census wants people to respond online because it will save them money. They don’t have to transfer data from paper forms and they don’t have to send census workers out. From a pure finance standpoint, it makes perfect sense. The census will cost us about $15 billion this time around. And, from a […]
Continue reading →
[DISPLAY_ACURAX_ICONS]