The war on distributed computers has been public for a long time, with viruses, trojan horses, exposures, exploits, fixes, hackers and impacted organizations having their information published as part of the rapidly progressing journey of distributed computing security.
Though enterprise IT departments are constantly evolving, IT environments need to continue to be incredibly fast, yet reliable. DevOps has emerged as a critical component of IT by providing quick responses to business needs while keeping essential systems stable.
In this entry, I use a number of computer abbreviations and concepts that may not be familiar to all. I have placed a mini-glossary* at the end to make it clearer. “I can tell you I know most corporations have an SLA* for critical patches* in Windows.* It’s probably 72 hours. Or maybe 90.
IT security professionals are focused on rooting out potential attack vectors that hackers can exploit to gain access to corporate data. That’s why the bring-your-own-device (BYOD) trend–the introduction of many new unsecured personal devices onto the corporate network just increases the number of
In the previous blog, Phil Young suggested inoculating the mainframe ecosystem as an effective security strategy. And getting the word out, for example with this series, is a part of making that inoculations happen. There are other parts, of course