Security In Context

Bringing you news and commentary on solutions and strategies for protecting your critical IT infrastructure.

Archive for April, 2011


Confessions of an Informed IT Director

Hi, my name is Barney, I’m an IT Director at a multi-national telecommunications company and it’s been 2 years, 4 months, 1 week, 3 days and 11 hours since my last failed audit. (All together now) HI BARNEY!

Post by Peter McCalister April 8, 2011
Break in

Scanning Problems through a Firewall

Vulnerability assessment scanning through a network or host-based firewall can create an unknown level of complexity, uncertainty into the quality of scan results, and a change control process that essentially decreases the security posture of the network and / or host in order to perform a vulnerability assessment scan.

Post by Morey Haber April 7, 2011
, ,

NASA Vulnerability and Admin Rights

A report came out recently highlighting vulnerabilities in NASA’s IT that could have impaired critical space missions or leaked sensitive information.

Post by Peter McCalister April 7, 2011

Confessions of a Paranoid IT Director

Hi, my name is Betty, I’m an IT Director at a large utility company and it’s been 1 week since my VP of Software Development complained that security was locked down too tight to get anything done. (All together now) HI BETTY!

Post by Peter McCalister April 6, 2011
Abstract clockwork

Do Systems Really Fail, Or the Over-Privileged People Running Them?

According to a recent Symantec sponsored survey, system failure has replaced negligence as the single biggest source of data breach involving UK firms, for the third successive year. However, that depends on how you interpret the data.

Post by Peter McCalister April 5, 2011

Confessions of an Apathetic IT Director

Hi, my name is Bob, I’m an IT Director at a mid-sized financial company and it’s been 11 months since my last insider attack…that I know of. (All together now) HI BOB!

Post by Peter McCalister April 4, 2011

Top Vulnerability Management Trending and Delta Reports

Every organization wants to know where they are going and where they have been.  Performing an analysis on the here and now only gives a snapshot that gives little perspective into how things have progressed or patterns for the future. For vulnerability assessment, many clients rely on delta reports to compare scan jobs and data…

Post by Morey Haber April 1, 2011

Who Controls Your Favorite Personal Computing Device?

As a longtime Blackberry user I have been looking forward to the release of the Blackberry Playbook. With many of my colleagues using tablets, particularly iPads, I have been getting a little jealous of what they could do. So in addition to the excitement about RIM setting a release date I also noted the excitement about the announcement that the Playbook will support Android Apps.

Post by Peter McCalister April 1, 2011