|
Laura's Corner Archives
2017
 |
November 14, 2017 |
Server centric intrusion detection is critical and augments network intrusion detection systems.
In Laura's Corner we answer questions being posed by clients in these areas.
|
 |
September 9, 2017 |
Our last email blast generated many questions from our valued readers. We have
selected several representative of those received to answer at this time.
|
 |
July 24, 2017 |
Realizing these risks, IBM introduced the z14 focused on further enhancing security. While the new
encryption support of the z14 is a highlight of this new processor, exploiting IDS will bring significant
protections to all z systems. The business benefit IDS provides is reducing the chance of missing
security threats which could compromise confidentiality, integrity, privacy, or availability of mission
critical assets and processes. |
 |
June 30, 2017 |
The Blockchain is a secure transaction ledger database that is shared by all parties participating
in an established, distributed network of peer-peer computers. It records and stores every
transaction that occurs in the network, essentially eliminating the need for "trusted" third parties
such as payment processors. Entities participating in a transaction are not necessarily known to
each other yet they exchange value with confidence and no third-party validation. For this
reason, Blockchain is a potential game changer. |
 |
May 17, 2017 |
If you are going to adopt microservices, you also have to understand that microservice
architectures have many moving parts, a high rate of change, short lifetimes, and complex endto-
end request flows. When it comes to management, this presents an important difference
between microservices and monolithic architectures. More moving parts mean more complexity
to monitor and manage in order to keep applications and infrastructure healthy and running. |
 |
March 6, 2017 |
Let's focus on Intrusion Detection Systems (IDS), which many leave to the infrastructure team.
Infrastructure or network base IDS focuses on passive monitoring of packets flowing in all
directions and alerts based on real time activity. Server based IDS is very different. Residing on
the server, it monitors several types of changes over time which may indicate security problems.
IDS monitors the dynamic behavior and the state of a computer system and compares what it
expects to see with what it actually sees. |
|