Security metrics research One of the most difficult aspects of managing risk in information assurance (IA) is that our statistical information is so poor. We don't know about security breaches that we have not noticed; we don't report all the breaches that we do notice to any central collection point; and we use dreadful methodology for collecting information using poorly constructed surveys that have tiny percentages of respondents, no internal validation and no follow-up verification. Virtualization security: So far nothing In April 2004 I wrote my first article on the topic of virtualization security. I was trying to bring attention to the security aspects of this "new" technology that was getting quite a bit of hype at the time. The hope was that this time security would not be an afterthought, that we would reverse the equine-escape/egress-closure sequence. Six high-tech "less-lethal" weapons that could ruin your day It is amazing that over time humans in general have never been at a loss to develop new and unique ways to inflict pain and damage to other humans. With millions of development dollars flowing into the research of these systems, it is at least encouraging to see the government recognize that the emergence of new, high-tech, less-lethal weapons poses a number of possible issues: death, significant injuries and civil rights problems among them. Configuring an Authoritative Time Server (the cool way) CloseThe other day, I saw this really cool blog posting by the Directory Servers team titled: Configuring an Authoritative Time Server with Group Policy Using WMI Filtering. Basically, in our every ending quest to ensure time is sync'ed the posting show how to use WMI Filtering to force certain GPO settings upon the PDC emulator. |
No comments:
Post a Comment