Remove Apple Remove Applications Remove Architecture Remove Firewall
article thumbnail

Overcoming the Equation: Security = Friction

CTOvision

We’ve migrated to a userid-password society; as we’ve added layers of security, we password-protect each layer: PC (and now device), network, enclave, application, database, and storage (encryption). It’s much easier to use biometrics or a SmartCard to identify yourself to a system or application. Userids and passwords are almost free.

Security 249
article thumbnail

Why IT leaders are putting more business spin on security spend

CIO Business Intelligence

But despite those expenditures, there have already been at least 13 major data breaches, including at Apple, Meta and Twitter. To better focus security spend, some chief information security officers (CISOs) are shifting their risk assessments from IT systems to the data, applications, and processes that keep the business going. “If

Security 111
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Technology Short Take #63

Scott Lowe

Russell Pope at Kovarus recently wrote about using security groups to manage the VMware NSX distributed firewall. Marcos Hernandez (a colleague on the NSX team at VMware) recently pointed out this Heat template for a multi-tier application with dynamic routing (via Quagga). Operating Systems/Applications. Servers/Hardware.

Vmware 60
article thumbnail

Technology Short Take #77

Scott Lowe

There was a fair amount of wailing and gnashing of teeth when Apple updated the MacBook Pro line with the Touch Bar. Vivek Gite over at nixCraft explains how to use ufw (Uncomplicated Firewall) on Ubuntu to limit SSH connections. Operating Systems/Applications. Some people love it, others absolutely hate it. Read this post.)

Linux 60
article thumbnail

Technology Short Take #68

Scott Lowe

In the event you accidentally locked yourself out of vCenter using NSX’s distributed firewall, this post by Roie Ben Haim provides a workaround for getting yourself out of this pickle. Operating Systems/Applications. I enjoyed Adam Leventhal’s evaluation of APFS , the new file system announced at the most recent Apple WWDC.

Linux 60
article thumbnail

Fountainhead: Infrastructure Orchestration in use within SPs.

Fountainhead

In the way virtualization abstracts & configures the software world (O/S, applications, etc.), Ive been pointing out applications for this technology in Healthcare as well as in the Financial sector , and I thought it would also be useful to illustrate value in the Service Provider / Hosting market. ► July. (2).

article thumbnail

Technology Short Take #57

Scott Lowe

We all know that security is more than just a host-based firewall, but a host-based firewall can be part of an overall security strategy. This article provides a good introductory overview of Linux iptables commands for configuring host-based firewall rules on your Linux systems. Operating Systems/Applications.

Windows 60