What is Wardriving?

Wireless networks have certainly brought a lot of convenience to our lives, allowing us to work and surf from almost anywhere—home, cafes, airports and hotels around the globe. But unfortunately, wireless connectivity has also brought convenience to hackers because it gives them the opportunity to capture all data we type into our connected computers and devices through the air, and even take control of them. While it may sound odd…

Cloud is the New Security Perimeter

The rise of cloud computing is undeniable and unstoppable, information security professionals have to accept resistance to cloud is futile. The Cisco 2014 Annual Security Report, projects cloud network traffic will grow more than threefold by 2017, with businesses executives eyeing up cloud as the silver bullet in eliminating expensive IT hardware. This cost saving elixir means cloud solutions are often quickly steamrollered in by business, leaving information security playing…

Cloud is the New Security Perimeter

The rise of cloud computing is undeniable and unstoppable, information security professionals have to accept resistance to cloud is futile. The Cisco 2014 Annual Security Report, projects cloud network traffic will grow more than threefold by 2017, with businesses executives eyeing up cloud as the silver bullet in eliminating expensive IT hardware. This cost saving elixir means cloud solutions are often quickly steamrollered in by business, leaving information security playing…

The future of data storage and cloud access at IBM Edge2014

The IBM Edge2014 conference showcased a variety of data storage, management, and cloud access projects. The IBM Edge2014 conference held  in Las Vegas showcased a variety of technologies being developed by IBM that promise to be the future of enterprise data storage. The technologies were presented by Clod Barrera, chief technical strategist for IBM System Storage, and Dr. Axel Koester, executive IT specialist for IBM System Storage. Tony Pearson, Master Inventor and…

“There’s no patch for Human Stupidity.” Well said Hacker News!!!

An article in Hacker News inspired me to write this blog post. Social engineering, in the context of security, is understood to mean the art of manipulating people into performing actions or divulging confidential information. This is a type of confidence trick for the purpose of information gathering, fraud, or computer system access. It differs from traditional cons in that often the attack is a mere step in a more…