The whole system needs an overhaul: encryption is generally not recommended or tacked on as an afterthought, UIDs are ancient and unneeded, and everyone tacks on their own implementations haphazardly leading to accounts-daemon or pam_limits or even ldap/active directory configuration.
Read MoreQueue the sequel: The Unicorn Project was published last year. The story is set during the same time period as the Phoenix Project but this time it’s from a software developer’s perspective. Maxine is scapegoated for an outage she could not have caused; an example of a 4th ideal violation (more on this later). Her punishment is reassignment to the Phoenix Project but her work ethic enables her to spearhead vast improvements through rebellion and direct subversion of ITIL processes.
Read MoreI recently broke into an Active Directory domain controller service account. They were running old software that was both publicly accessible and vulnerable. I’ll take this moment to remind everyone about the importance of patching your software!
Read MoreThere’s a causal relationship between social isolation and cyber attacks. When the bad guys are bored at home they tend to fill their time with cyber attacks. There is a marked increase in the incidence of attacks around Christmas time and we expected a similar increase during this pandemic.
Read MoreZoom is video conferencing and online meeting software. They went public on the stock exchange for $36/share in 2019 and are currently sitting at $120/share with a year to date of 76% in 2020 even though market is down 30%. Investors clearly believe in the company and I agree, the response from Zoom has been awesome.
Read MoreItaly has been especially terrorized by COVID-19. They had to 3D print valves to save lives when the supply chain broke down and they couldn’t get them any other way. The STL file isn’t available for this valve nor has it been officially tested and validated but, at the end of the day, it’s going to work better than nothing during a shortage.
Read More