David Strom

David Strom is an old hand at enterprise IT, having worked in the industry from the early days of the PC. He has developed numerous print and Web publications for IT managers and developers and runs the Dice Security Technical Community here.

Big Data Makes Things Better

Big Data isn’t some abstract concept. It can improve airline travel, boost security, and even create a better cow. continue…

Massive Spamming Botnet Whacked. Ding-dong Witch Is Dead

One of the largest spam botnets has been dismantled, at least according to security researchers. The Grum botnet had the last of its command and control servers taken offline several weeks ago. This included six located in the Ukraine and one in Russia, says FireEye senior staff scientist Atif Mushtaq in a blog post. FireEye was part of collaborative group of security experts who launched a takedown of the Russian command and control server. When the group failed to get a… continue…

Simple Security Tricks You Need to Know

Renaming admin accounts to something that’s not obvious, changing ports of well-known exploited programs such as RDP to higher-numbered ones, and setting up a honeypot are all well-known tricks in the security world, but it’s nice to see them all  in a comprehensive list created by security expert Roger Grimes. While there isn’t anything really new in security, sometimes a refresher course on the basics can be helpful. If you haven’t thought about some of these ideas, it’s worth taking… continue…

Anatomy of A Well-Planned Phishing Attack

We all know not to open email attachments, and to suspect odd emails that arrive at random from seemingly legit places. The bloggers at Solutionary have put together this rather interesting analysis of a phishing email that one of their staffers received recently. It purported to be a FedEx shipping confirmation. FedEx and other package delivery services have long been a popular target for phishers, who craft emails that look like delivery status updates. (They are so popular that they even have their… continue…

Choosing the Right Security Tools to Protect VMs

Virtual machines need protection from viruses and other attacks, along with a high level of access control. continue…

Keeping Track of Your Cloud Costs

Posted In Cloud
Getting control of your cloud-computing costs is a challenge for any organization, but also a necessary one. continue…

Gen Y and Baby Boomers Generations Apart on Security

Gen Y and older computer users tend to differ in the music they like, clothes they wear and hair styles. But apparently the generation gap extends to computer security too, says CheckPoint Software’s Zone Alarm business unit. Gen Y is significantly less likely to use generally accepted security practices, such as anti-virus scanners, firewalls and network intrusion detection products on their computers, notes CheckPoint’s security survey. And the vast majority of this generation keeps 84 percent of their sensitive data, such… continue…

How Easy it is to Defeat Captchas

captcha
A study by security vendor Imperva is very depressing, showing the broad collection of programs and people that are trying to systematically defeat CAPTCHA security apps and harvest personal information from various websites. CAPTCHAS are those squiggly collection of letters you have to type in to prove you are human and not a bot. The only trouble is that they have been routinely compromised. Look at this chart which shows the results from Captcha Sniper which can solve routines from 50… continue…

B.I. and Big Data Can Play Together Nicely

Integrating a Big Data project with a traditional B.I. shop can take a lot of work, but a few suggestions could make the process easier. continue…

Hadoop Success Demands Innovative Best Practices

A successful enterprise Hadoop deployment hinges on understanding a handful of best practices. continue…