As 2015 winds down to a close, I reflect on what 2015 brought IT.
New Mac OS X Means New Tricks...
Wow, who abducted our Windows 10 assumptions and left this smooth running and easy-to-use Operating System in their place?
The Cloud is mighty! All Hail the Cloud, The Slayer of PCs!
Windows 8 was envisioned as a desktop OS capable of fighting the consumers' fling with Tablets. Now that the war is against Tablets AND PC's, can Windows 10 draw consumers to it?
Traenk mulls over his ethical hacking job and remote access technologies. Does user convenience make unseen threats more real?
No matter what the need, few security organizations are as dedicated to helping us InfoSec Pros as SANS.
Long ago, Traenk read about new attacks, attacks modeled after biological attacks. Those were viruses; what new comes?
Two Grandfather clocks--what can you do with those? How high-tech are those?
Vulnerability Analysis is deceptively easy. Security Red Teaming requires more than that.
With today's "connected life" running 24/7, we recognize it's hard to keep up with all your favorite websites and tech resources. The IT List is here to help you cut through the noise. Check back each Friday for a quick digest of articles, resources, promotions, and other goodies worth a first or second look on InformIT.
Traenk kept his Windows system from the Internet, from even starting, for some 45 days. A lot can de-evolve in 45 days... Honestly, how long does it take before your system becomes very vulnerable and how long must we wait for new Windows components? Will Windows 9 fix the issues?
Cisco Firepower Threat Defense (FTD): Configuration and Troubleshooting Best Practices for the Next-Generation Firewall (NGFW), Next-Generation Intrusion Prevention System (NGIPS), and Advanced Malware Protection (AMP)