Monthly Archives: September 2012

Most Data Breaches Come From Within


September 24, 2012 By
The Vigilant Application Owner

Infosecurity – (International) Most data breaches come from within. While the data breach events that catch headlines are the work of hacking collectives and professional malware writers, it turns out that the vast majority of information compromises are caused by companies’ own unwitting employees. According to new research from Forrester, only 25 percent of data […]

Continue reading...

What Enterprise Architects and Time Travelers have in Common


September 21, 2012 By
Tim O'Brien

Note: This post was inspired by Manfred’s post “You don’t do repository driven development? Where have you been?”. It immediately made me think of Star Trek… When I roll up to a new client in desperate need of build help, there’s always a chance I’ll have a “Scotty moment” – a moment when I pick […]

Continue reading...

IBM: Top Threats Include Data Breaches, BYOD, Browser Exploits


September 20, 2012 By
The Vigilant Application Owner

Infosecurity – (International) IBM: Top threats include data breaches, BYOD, browser exploits. When it comes to trends in security for 2012 so far, the landscape has seen a sharp increase in browser-related exploits, like recent ones for – 15 – Internet Explorer and Java, along with renewed concerns around social media password security and continued […]

Continue reading...

Don’t Do it Wrong: Put that Puppet in a Box and Use Nexus for Devops


By
Tim O'Brien

Companies all over the place are trying to convert existing deployment scripts over to automated systems like Puppet and Chef. Many of the systems I’ve seen in the past few months have very complex codebases, builds that take 40 minutes to execute, and deployments that span hundreds of VM instances on public clouds like Amazon […]

Continue reading...

Stuxnet Tricks Copied By Computer Criminals


September 19, 2012 By
The Vigilant Application Owner

Technology Review – (International) Stuxnet tricks copied by computer criminals. Experts indicate the techniques used in sophisticated, statebacked malware are trickling down to less-skilled programmers who target regular Web users and their online accounts or credit card details. State-sponsored malware became widely known in 2010 with the discovery of Stuxnet, a program targeted at Iranian […]

Continue reading...

Last Chance! Join Us In Philly For Breakfast & Some Hot Tech Talk


September 18, 2012 By
Emily Blades

Our Philadelphia Breakfast Meetup is next Tuesday, September 25 from 8:30AM-10:30AM and only a few seats remain. Don’t miss out! Jason van Zyl, Sonatype CTO and creator of Maven will be teaming up with Joel Confino, a Senior Consultant at Chariot Solutions and they’ll be giving informal talks to show you how you can dramatically […]

Continue reading...

Data Breaches Expose 94 Million Records In The Government Sector


September 10, 2012 By
The Vigilant Application Owner

Help Net Security – (National) Data breaches expose 94 million records in the government sector. An analysis of government breach data shows that the government sector reported 268 incidents of data breaches from January 1, 2009 to May 31, 2012, which exposed more than 94 million records containing personally identifiable information (PII), according to Rapid7. […]

Continue reading...