GovInfoSecurity reports on a flash drive that breached the US Department of Defense Deputy Defense Secretary William Lynn III, in an article to be published by the journal Foreign Affairs, writes that a flash drive inserted into a laptop on a military post in the Middle East in 2008 caused the most significant breach of … Continue reading Operation Buckshot Yankee→
The Register says at least 40 applications and the Windows operating system are vulnerable to remote-code execution. Here is the bit that caught my attention: “Since Windows systems by default have the Web Client service running – which makes remote network shares accessible via WebDAV – the malicious DLL can also be deployed from an … Continue reading Windows Remote Execution Flaw – Binary Planting→
Newsflash. Heartland was not breached again today. Ok, I am being faecetious but there also is a very important point of truth to this post. The CIO of Heartland, Steven Elefant, called me about my blog post the other day called “Heartland Breached Again?”. He wanted to clarify the incident and how it was handled. … Continue reading Heartland *NOT* Breached Again→
Denise Dubie quotes a Gartner VP webinar in her story “Technologies that won’t be ignored”. I found some analysis did not settle well. “We cannot consolidate desktops. PCs by definition have a one-to-one ratio,” Paquet explained. “The return on investment model is fundamentally different even though the technology is fundamentally the same and therefore will … Continue reading Gartner Down on Cloud→