You’ll recall from my previous post on the public key infrastructure that symmetrical encryption relies on some mechanism for securely exchanging keys. While the use of public and private keys solves this problem, there are other problems that they don’t solve. The most important of these are: If an attacker were ever to obtain a
The impact of the Meltdown patch depends on the system workload. To understand when there is likely to be an impact, it’s important to understand basically what the patch actually does and how it affects some key entities associated with the CPU. Tasks and task states Executing tasks on a device will be in one
We’ve met the new year forced to remain on our toes: Three new attack vectors have been documented by security researchers and while all three are to be discussed, the most important attack vector to focus on has been aptly named Meltdown. There are a plethora of news channels covering the particulars about the threats,
I was a bit surprised to see some excitable headlines in my news feeds this week. Amazingly, it even included the Daily Express! (For those readers outside the UK, the Daily Express is a daily tabloid whose headlines are generally pretty excitable and usually about how the end of the world is nigh because a
Last week in the Interlude of our graphic novel, we met Matt. Poor Matt. He made the unfortunate mistake of not having Tachyon installed. This week, meet James Davies. James is quite the character dressed in quite the get-up. What’s Mr. Holmes…er…I mean, Mr. Davies up to?
Whenever you throw a party and invite tons of people, you never know who exactly will show up— or what will happen for that matter. As was the case this Monday when we threw our first ever 1E Twitter Party. If you didn’t have a chance to join in, you can go to Twitter and use
The MVP community is vast and varied. With so many experts, it’s nearly impossible for you to not bump into one from time to time. But these experts are also super busy— from conferences and speaking engagements to authoring books and traveling the world, getting a piece of their time might not always be easy.
Last week in chapter five of our graphic novel, we watched as Jason and his team created a Product Pack in two minutes. A customer was helped and the Product Pack was added to the Tachyon Exchange for other people to use. But something felt uneasy…
The question of how to manage systems in a multi-forest Active Directory (AD) infrastructure using System Center Configuration Manager (ConfigMgr) comes up quite often in online forums and at customers; this post will summarize and detail the answers I’ve given (over and over again). The Really Short Answer It doesn’t matter, and ConfigMgr doesn’t care.
Oops, your files have been encrypted. The red screen signaling a cyber attack that emerged on over 400,000 devices all over the world aptly named WannaCry changed the face of IT security forever. We polled 400 IT professionals asking them about their experiences post-WannaCry to get a sense for how these teams responded to the