You are here : News & Events > Laura's Corner

Archive

Subscribe

 

Laura's Corner Archives

2017
Line
November 14, 2017 Server centric intrusion detection is critical and augments network intrusion detection systems. In Laura's Corner we answer questions being posed by clients in these areas.
Line
September 9, 2017 Our last email blast generated many questions from our valued readers. We have selected several representative of those received to answer at this time.
Line
July 24, 2017 Realizing these risks, IBM introduced the z14 focused on further enhancing security. While the new encryption support of the z14 is a highlight of this new processor, exploiting IDS will bring significant protections to all z systems. The business benefit IDS provides is reducing the chance of missing security threats which could compromise confidentiality, integrity, privacy, or availability of mission critical assets and processes.
Line
June 30, 2017 The Blockchain is a secure transaction ledger database that is shared by all parties participating in an established, distributed network of peer-peer computers. It records and stores every transaction that occurs in the network, essentially eliminating the need for "trusted" third parties such as payment processors. Entities participating in a transaction are not necessarily known to each other yet they exchange value with confidence and no third-party validation. For this reason, Blockchain is a potential game changer.
Line
May 17, 2017 If you are going to adopt microservices, you also have to understand that microservice architectures have many moving parts, a high rate of change, short lifetimes, and complex endto- end request flows. When it comes to management, this presents an important difference between microservices and monolithic architectures. More moving parts mean more complexity to monitor and manage in order to keep applications and infrastructure healthy and running.
Line
March 6, 2017 Let's focus on Intrusion Detection Systems (IDS), which many leave to the infrastructure team. Infrastructure or network base IDS focuses on passive monitoring of packets flowing in all directions and alerts based on real time activity. Server based IDS is very different. Residing on the server, it monitors several types of changes over time which may indicate security problems. IDS monitors the dynamic behavior and the state of a computer system and compares what it expects to see with what it actually sees.

Terms and Conditions

Privacy Policies

eMail AES

Copyright

1-650-617-2400

Copyright 2021 Applied Expert Systems LLC

All Rights Reserved