Spam Email, Explained

Situation: Your mother/friend/sister emails you and wants to know why you are sending her pornography or solicitations to send money so she can be saved from the foreign country in which she’s been stranded.  Most spam like this is not coming from your account. It’s usually coming from someone else that’s using your email address.  In order to understand the […]

Sophos releases Security Threat Report 2013

Sophos recently released its Security Threat Report 2013 focusing on Blackholes, the world’s most popular and notorious software exploit kits.  According to the report, Servers in the United States are the most infected in the world with 30.81% of hosted sites identified as Blackhole exploits.  These kits scan your computer for known vulnerabilities and then […]

Malware Warfare: Flame

The Flame virus became the hot topic in cyber security last week when security experts described it as one of the most sophisticated pieces of malicious software discovered to date.  The virus spreads via email, copies itself into the local network, can drop malicious files, and has a built-in keylogger to record private information.  Experts say the virus […]

The 10 Things Your Next Generation Firewall Must Do

There are three different areas a firewall must preform well in – security functions, operations, and performance. The security functional elements correspond to the efficacy of the security controls, and the ability for enterprises to manage risk associated with network traffic. From an operations perspective, the big question is: “where does application policy live, and […]

Two Different Viewpoints, Two Different Designs, One Right Approach

While conducting a random security audit at a client site last week, I realized that their firewalls were configured in a manner inconsistent with any firewalls I had seen before– half the ports were configured as one switch and the rest of the ports were configured as another switch, rendering the firewall into two switches […]

Stopping Hackers In The Social Network Age

[vc_row][vc_column][vc_column_text disable_pattern=”true” align=”left” margin_bottom=”0″] We are all aware of the recent tampering of our beloved social networking site Facebook.  Hopefully none of you were the unfortunate recipients of malicious activity, including: hardcore porn, grotesque human gore, and religious degradation as reported by The Christian Post, which was one of the first to cover the event.  Current […]

IT Resource Constraints And Its Impact On Security Patching

For the past two years, IT departments have seen their budgets and staff cut, forcing them to focus on the bare essentials. This trend is most visible in the server environment in which patching has become a non-essential task. As an enterprise architect and a security consultant, I’m seeing more and more environments that have […]

TCP Split Handshake and How It Could Affect Your Firewall Configuration

For those of us who work in the security world, a recent attack called TCP Split Handshake has caused many of us to question what is considered secure and what best practices are. This attack circumvents a rudimentary firewall configuration called “established session” in which a firewall will permit a session that was initiated from […]

Mid-Sized Manufacturing Company Contracts for Backup and Disaster Recovery Services with CrossRealms, Inc.

Chicago, IL, February 04, 2011 –(PR.com)– Backup and disaster recovery services, such as those offered by CrossRealms, Inc. of Chicago, are seeing increasingly higher adoption rates among corporations. Businesses today require turnkey technology solutions that meet their backup and disaster recovery needs without having to build them from scratch. To implement a successful backup and […]