AI Tech Update

AI Tech Update

E-mail requirements change for a safe use in the post PRISM internet

Recently is mounting a serious concern about e-mail use and misuse, after PRISM the question is if e-mail can still be used as a safe communication media both for personal and enterprise use. This is a difficult question since e-mail has always been a low security- high risk area in the enterprise as well as in the private world. When talking about mail we should remember what email really is: Email is a simple method to transfer information from a computer to another, the used protocol SMTP is a plain text protocol that pass all the information in clear text….

Digging it up on Security Costs and Security Budgets – part1

In my previous article, security costs and security budget, I made some assumption to simplify an introductory analysis on how much we should spend on security. Some of those assumptions have been made to simplify out tasks. Today I would like to quickly analyse some of those simplifications. One of the biggest assumption I made on the previous article is that if a problem cost us X then we can find a number n that express the number of incidents I’m allowed to permit so that nX can express the cost I’m allowed to accept. This simplification was based on…

Security Costs and Security Budgets

When I’m talking about security with customers, partners or at an event the first question I usually receive is: “how much this will cost to me?” This is an understandable question, costs have to be monitored and expenditure have to be planned wisely, the problem of  how much I canshould spend on security is a quite interesting topic. The problem, alas, is that usually IT managers do not use a clear model when planning investment in security but seamed to be attracted more by strange inner believes than a empirical analysis of cost and benefits. Another point that I’ve always found quite curious is that I’ve…

Is Big C missing the point on security?

Big company are really suited for security? This is what comes to my mind when we see what Cisco, HP and Co. do when we talk about security. Are they really able to focus on the innovation and development that security require? I  can talk about what I know so i will express my mixed feeling about Cisco and Security. For long times Cisco has not been perceived as a big player in the security space, beside the fact PIXASA is the most sold firewall in the world. But honestly we should not only consider the magnitude of the numbers but also why and how companies buy a product. Alas…

Kiss to you my new friend

Let’s follow a new spam saga 🙂   I juzt recieved a new spam message and now i’ll show you all bits and bytes 🙂 and of course we can continue publishing if you suggest me an answer   cheers   —–Original Message—– —–Internet Headers—– Microsoft Mail Internet Headers Version 2.0 Received: from xxx-xxx-xxx.xxxxx.xxx([xxx.xxx.xxx.xxx]) by xxx-xxs-xx.xxx.xxx with Microsoft SMTPSVC(6.0.3790.4675); Tue, 8 May 2012 15:41:52 +0200 Received: from xxx-xxx-xxx.xxxxx.xxx([xxx.xxx.xxx.xxx]) by xxx-xxx-xxx.xxx.xxx with Microsoft SMTPSVC(6.0.3790.4675); Tue, 8 May 2012 15:41:52 +0200 Received: from mtv-iport-4.cisco.com ([173.36.130.15]) by xbh-rcd-301.cisco.com with Microsoft SMTPSVC(6.0.3790.4675); Tue, 8 May 2012 08:41:49 -0500 X-Files: 2062888s.jpg : 60599 Received: from…

ISE basic installation and configuration. Part 2

When something can go wrong it will, at the end our friend Murphy was right. So I passed the day to to solve a weird problem, and I have to thanks a couple of colleagues of mine that were able to sort out what was wrong. By the way at the end I survived the effort and after a whole day of troubleshooting I just reinstalled the appliance from scratch and everything worked. The Web Interface   Now we can go on and see what we can do. open a supported browser and go to: http://<IP address or host name>/admin/…

ISE basic installation and configuration. Part 1

Ok since I have to do some activity on ISE I think would be nice to write a little journal that can be also used as a quick guideline. ISE is the acronym for Identity Service Engine, an identity policy manager released by cisco, now in version 1.1 available also on cisco cco website. It comes in different format, as appliances or as virtual machine on VMware, as well as as upgrade to other cisco engine. I will not look at the other release I will play a bit with the appliance. The Software Upgrade First of all I have…

ise training day 3

Posture posture and posture 🙂 interesting but long labs Related articles Ise Training day 2 (aitechupdate.wordpress.com) ISE basic installation and configuration. Part 2 (aitechupdate.wordpress.com) ISE basic installation and configuration. Part 1 (aitechupdate.wordpress.com) Open a file in PowerShell ISE via cmdlet – Version 3 Update (powertoe.wordpress.com) Proliferation of “Bring Your Own Device” (houstonchannels.wordpress.com) Related posts: Ise Training day 2 Diary of an acquisition part2 FW SPAM: My dear friend Looks good it’s good Yummy Powered by YARPP.

Ise Training day 2

Ok my turn to talk today:  We talked about one of the most interesting features of ISE, profiling. Worth to explain a little what profiling is, and what discovery and classification means. it is a very useful and powerful engine but it needs to be understood, also on what it means and why should be used. other great new, finally  ise 1.1 is available on CCO, worth the upgrade absolutely. http://www.cisco.com/en/US/docs/security/ise/1.1/release_notes/ise1.1_rn.html new stuffs: – Support for IOS Sensor for advanced features and remote profiling on the switch. – Active scan with NMAP. – A new portal guest type Device Registration…

Today ISE training day 1

Image by Getty Images via @daylife and the day is gonna be at its end for the first day of ISE training here, tomorrow I will have to talk about Profiling, we’ll see Related articles Configure cisco ISE for Cisco Access Points (aitechupdate.wordpress.com) Fab Site: ThisIsAuto.com (fabsugar.com) Canon Powershot SX210IS Best Buy (canondigitalslrcamerasbuy.wordpress.com) Good practice to delete rows from database by attribute(eg. is_removed) (stackoverflow.com) Squaring Numbers from 30-70 (mathema-tricks.blogspot.com) How We’re Going Fix Online Identity and Reputation (readwriteweb.com) Οι συζητήσεις μας (sxoliastesxwrissynora.wordpress.com) Method isEmpty for binary tree proble (stackoverflow.com) Double-Check the Accuracy of Your Clock at Time.is [Clocks] (lifehacker.com) It…

Posts navigation