AI Tech Update

AI Tech Update

My Latest Article on Hakin9 is on Ddos

It has been released the latest edition of Hakin9 Magazine, and I’ve been so lucky to have another article published, this time on DDos. If you are interested on the subject or the issue just go to: https://hakin9.org/ddos-attacks-and-prevention/ Hope will be a pleasant reading 🙂 for any question do not hesitate to contact me. you can reach me on: twitter: @antonioierano and @thepuchiherald linkedin: it.linkedin.com/in/antonioierano/ as usual I’ll be glad if you join my networks. ciao Antonio Related articles FDL Under DDoS Attack: We Need Your Help Incapsula launches added protection against DDoS attacks DDoS Hosting Solutions Increases its DDoS Protection…

Wireshark, Tools and forensic

  Intro   Making a forensic analysis means to be able to collect and analyze data in order to find out evidence that could led you to a specific break.   Although is usually considered a post-mortem activity in the IT realm this aspect is less marked than in other forensic environment. If we are running an investigation on a homicide, as an example, we will be present when everything is already done, and we just have to collect cold evidence. On the other end when we are running a forensic IT investigation we cannot be sure that the event…

Download a eForensic magazine free copy with my latest article

I would like to invite you to download the latest copy of eForensic Magazine with my latest Article free. Is a 30$ gift, hope you enjoy 🙂 I have only a limited number of downloads available so the sooner the better http://eforensicsmag.com/network-toolbox/     Related posts: Appunti sulla Costituzione Italiana, Art. 2. PostOffice has a new home PostOffice: A Facebook Hack An Embarassing mistake or an hidden message? My Latest Article on Hakin9 is on Ddos Powered by YARPP.

Look what I found

While digging some pictures for my website i found a few old certifications of mine, the old MCP one, the MCT MCSE that state since 1996, even the Cisco Ironport Certification (I used to be a trainer) and the old ASE and ACT compaq certification. Geez I feel so old. in the same dig i were trying to find pictures of my previous job activities but I’m afraid I were not able to find anything. But at least I found a few old business card, I have never been a huge fan of Business Cards so it was quite a…

Foretelling: Will Crystal Balls Run On Android?

  TECHNOLOGY   Foretelling: Will Crystal Balls Run On Android?   By Antonio Ieranò on November 3, 2013 at 10:22 AM   It is always good to take a look at the people in the metro or train to get a better sense of the impact of technology in our lives. Consumers’ rapidly evolving and new tastes become apparent, a process that should interest anyone with some interest in where we are headed. Until not very long ago, it was common to see few commuters reading newspapers or magazines while most stood up trying not sleep. Today things have changed. The expansion…

Wanted Dead or Alive: The Human Factor

TECHNOLOGY originally published on DaftBlogger.com Wanted Dead or Alive: The Human Factor By Antonio Ieranò on September 29, 2013 at 7:45 PM Contents [hide] 1 From where should we start? 2 I said it all but… 3 Theory? OK I confess I am quite bored to listen to all those knowledgeable IT security experts talking about what is needed to secure a system. Everyone has his own point of view; of course they’re right when they say we need end-point security, mobile protection, anti-malware, anti-hacking, dlp, advance threat defense and protection. We all know we need firewalls, IPSIDS, cypher encryption systems, SSO, 802.1x, strong authentication, anti-virus, anti-everything,…

E-mail requirements change for a safe use in the post PRISM internet

Recently is mounting a serious concern about e-mail use and misuse, after PRISM the question is if e-mail can still be used as a safe communication media both for personal and enterprise use. This is a difficult question since e-mail has always been a low security- high risk area in the enterprise as well as in the private world. When talking about mail we should remember what email really is: Email is a simple method to transfer information from a computer to another, the used protocol SMTP is a plain text protocol that pass all the information in clear text….

Digging it up on Security Costs and Security Budgets – part1

In my previous article, security costs and security budget, I made some assumption to simplify an introductory analysis on how much we should spend on security. Some of those assumptions have been made to simplify out tasks. Today I would like to quickly analyse some of those simplifications. One of the biggest assumption I made on the previous article is that if a problem cost us X then we can find a number n that express the number of incidents I’m allowed to permit so that nX can express the cost I’m allowed to accept. This simplification was based on…

Security Costs and Security Budgets

When I’m talking about security with customers, partners or at an event the first question I usually receive is: “how much this will cost to me?” This is an understandable question, costs have to be monitored and expenditure have to be planned wisely, the problem of  how much I canshould spend on security is a quite interesting topic. The problem, alas, is that usually IT managers do not use a clear model when planning investment in security but seamed to be attracted more by strange inner believes than a empirical analysis of cost and benefits. Another point that I’ve always found quite curious is that I’ve…

Is Big C missing the point on security?

Big company are really suited for security? This is what comes to my mind when we see what Cisco, HP and Co. do when we talk about security. Are they really able to focus on the innovation and development that security require? I  can talk about what I know so i will express my mixed feeling about Cisco and Security. For long times Cisco has not been perceived as a big player in the security space, beside the fact PIXASA is the most sold firewall in the world. But honestly we should not only consider the magnitude of the numbers but also why and how companies buy a product. Alas…

Posts navigation