Welcome to The UltraTech Zone Sign in | Join | Help

Talking Out Loud with ASB

Views on Life, Technology and Everything, by ASB (aka Logik!)...

My Profile

Andrew S. Baker (ASB)

News

  • Platform: CS v2.1 SP2...

    Get a FREE phishing filter for your domain!

    Who links to my website?

    Pando Pro

Browse by Tags

All Tags » 2013   (RSS)

Looking forward to Windows Server 2012 R2
I was just reading the ComputerWorld article on some upcoming features of Windows Server 2012 R2 , and I see some really intriguing improvements: In Windows Server 2012 R2, the PowerShell command-line scripting language introduces a feature called Desired Read More...
A look at Microsoft’s SIR v14
So…. I finally had a chance to finish reading the latest full edition of Microsoft’s latest Security Intelligence Report . There’s a lot of really good info in the report. The executive summary also does a good job of highlighting key points.  That Read More...
Dueling Business Mindsets
If there is one lesson that technologists need to understand in order to be successful, it’s that business is ultimately more about people than about process or technology .  At the end of the day, how people think, behave and operate will have be Read More...
Enhancing My WLAN with a Meraki MR12
I finally got a chance to deploy a Meraki MR12 wireless access point . These are some sweet devices.  I wasn’t that happy with the PoE brick that it comes with for power, but getting it setup has been quite pleasant. As an enterprise device, it supports Read More...
Wise Security Investment Approaches
A holistic approach to information security needs to address a corporate strategy for buying or building solutions. Such a strategy will have an impact on how a company looks at staffing and technology investments. There are two basic ways to look at Read More...
The Futility of Blaming IT
In recent years, it has become popular sport to blame information technology (IT) departments and IT leaders for failures – real or imagined – which adversely impact business operations.  Even some technology trade journals seem unable to get through Read More...
Reading Between the Lines of Breach Notifications
Back in September 2012, I wrote two articles for Point2Security on how to effectively handle breach notifications: The Who of Post-Breach Communication Post-Breach Communication: The Importance of How & When Sadly, to many organizations are doing Read More...
Get Real with Information Security
In 2012, the writers of malware and the attackers of networks were very busy, using both social engineering and increased technical sophistication to fuel an increased number of attacks. Not incidentally, mobile devices just flew off the shelves this Read More...