
We really all thought it was Google, only to find out it was the person’s employer
We really all thought it was Google, only to find out it was the person’s employer Yesterday the web site Medium posted that they got a surprise visit from the Joint Terrorism Task Force to talk about some Google searches they were doing about pressure cookers, back packs, and other interesting things to search for. […]

Adobe and SAP head towards the cloud
Adobe and SAP head towards the cloud Not unexpected but with the idea of the subscription model to even out income at Adobe, and the success of other cloud ERP providers SAP had to do this, expect more large companies to watch this roll out and see what happens. I have not gotten into Adobe […]

Does the Internet really need a Delete Tool?
Does the Internet really need a Delete Tool? Every once in a while someone comes along with an idea that makes sense, but given the value of the data we put out there for governments, employers, and marketing folks, I don’t think a delete tool for the internet is going to happen. I am sure […]

When things go wrong with Windows Azure
When things go wrong with Windows Azure I recently started with Windows Azure, and really tried to start digging into it today. Unfortunately, everything went wrong. Windows Azure is turning into one stubborn system to get to do much with. It all started with trying to redeem my coupon code for a free three month […]

Facebook needs to learn to manage scruffy neighborhoods to stay relevant
Facebook needs to learn to manage scruffy neighborhoods to stay relevant Not all of us live in or want to live in a PG-13 world. But the recent rash of shutdowns over perfectly normal behavior has me wondering how Facebook’s going to set a global standard for what the social media neighborhood looks like. Failbook, […]

Will Obama’s Cyber Warfare Policy Backfire?
Jason Healey, director of the Cyber Statecraft Initiative at the Atlantic Council brings up an interesting thought about how diplomacy is shaping how we view cyber warfare. In an article over on usnews.com Mr. Healey brings up some interesting points about how we are approaching cyber warfare using a two-pronged approach. One approach is to […]

A cyberwar barely in the making
We are asking China to stop poking at our networks; maybe we should take a look at what everyone else is doing along the way. An international framework is probably in order at this point. Many news systems are broadcasting that America is asking/telling China to stop hacking American Companies. While in testimony Army Gen. […]

Public Honeynet Data – Who are the top 20 hacking countries?
Public Honeynet Data – Who are the top 20 hacking countries? I could watch this site all day. In case you were wondering really wondering who the top hacker countries are, the German Alliance for Cyber Security has a dashboard display as to what is happening on 97 honeypots around the internet. It makes for […]

Google Hacking Critical Infrastructure
This is where things on the internet get interesting. Google hacking critical infrastructure based on data from sites like ShodanHQ and others opens the door to further penetration of support systems. The more interesting part on this is that as these hacks were tested, the systems would only work well in Internet Explorer or relied […]

Using Route 53 in Amazon Web Services
Sometimes you just need a little DNS to get you through your day. This is an 18 minute video that goes through the configuration of Route 53 both at Dreamhost (my service provider) and Amazon Web Services. The setup is fairly straight forward with little to no hitches when setting up the system. The main […]

Mandiant and APT1 cyber warfare espionage
Hey wait, if we have screen video of hackers doing their work, doesn’t that mean we penetrated the hackers methods, processes, and other information resources? Sometimes I don’t think we are thinking clearly enough, as the fear mongering escalates for cyber warfare, and how we are all going to go through an electronic pearl harbour, […]

Executive Order: Improving Critical Infrastructure Cybersecurity
Heck, we wouldn’t be bloggers, and we wouldn’t care about our industry, cloud or information security if we didn’t spend time reading this executive order and seeing what hidden neat treats there are in there. Overall I am impressed with this executive order as it looks like someone actually thought about it in the first […]

Understanding Amazon Web Services Cloud Watch
Sometimes making an alarm is the best thing you can do for yourself when working with Amazon Web Services. Sometimes things can go wrong with your cloud computing installation, and it would be a great idea to know what is happening with your cloud systems. We simply cannot have the console open 24X7 to monitor […]

Does it matter if you are popular on LinkedIn?
I am sure that some of us have gotten these really cool e-mails from Linkedin lately helping us put some kind of context around our relative popularity on the internet, or at least on the LinkedIn system. The problem is that being popular on LinkedIn does not matter to me at all. Sure the infographic […]