Michael Myser

New York County Proposes Law to Enforce Wi-Fi Security

A public official in Westchester County, some 30 miles north of New York, has proposed legislation that would require businesses that collect customer information to apply basic security like...

Rootkit Takes Aim at AOL

Security researchers have identified a rootkit being spread through AOLs popular instant messaging client and AOL chat rooms. Bundled within the previously identified W32/Sdbot-ADD worm, the lockx.exe rootkit file is...

DNS Survey Finds Widespread Vulnerability

In a security survey of some 1.3 million DNS servers, an Internet measurement firm found that as many as 84 percent of those servers could be susceptible to pharming...

Broadband Access Debates Speed Up

The Federal Communications Commission earlier this month voted to no longer require telephone companies to sell DSL services to independent competitors at regulated rates, changing the landscape of the...

Cisco Warns of SSL Vulnerability

Cisco on Monday released a security advisory and software fix for a vulnerability that affects two of the companys network security products. Attackers could use the vulnerability to gain access...

Latest Posts

IBM Sets Another Smallness Record with 2nm Chip Blueprints

Okay, now that IBM has revealed its 2nm chip design and process blueprint, what's next? A virtual chip? Two nanometers is smaller in width...

Dell Unveils, Explains APEX ‘Portfolio-as-a-Service’

In one of its busiest news-making days in the last few years, Dell EMC on May 5 at its  virtualized Dell Technologies World unveiled...

Dell-VMware Split a Hot Topic for IT Watchers

An old Bob Dylan song titled “The Times They are A-Changin' ” reminds me of what’s going on in tech today. The reality is...

Why It’s Critical to Manage Privileges and Access Across Your Multi-Cloud Environments

Conventional approaches to privileged access and identity management are ineffective in today’s cloud-oriented DevSecOps environments. The concept of least privilege access still remains foundational...

Five Hidden Costs in Code Migration: How to Avoid Surprise Expenses

Migration to the cloud is in full flight. The most complex challenge involved in completing these migrations is not moving the data but migrating...