Slashdot is powered by your submissions, so send in your scoop


Forgot your password?

Comment Sounds normal to me (Score 3, Interesting) 198

The role of an enterprise architect is to work with stakeholders, gather requirements, create time lines and then hand their work over to another team to implement and continue to provide governance. At best you might be lucky to get access to some sort of test environment. I am TOGAF certified and like you before I started didn't understand what it was before I started. The trainer I had described it as creating cartoons for executives. I still got the cert but realized it really wasn't for me. I will say that I think the role is very important and as an implementor is designed to answer the questions I often have when building something like number of users, availability requirements etc.

Comment Re: What a clusterfuck (Score 1) 676

A TS device can have up to TS level documents, so unclass, secret, TS, etc. An unclass device can only contain unclass documents. So the device can have documents that go down. It should be physically impossible for someone on an TS device to email someone on the Internet. Therefore, if a TS document ever makes it on to an unclassified machine someone screwed up (maybe with a scanner or CD drive or something). That someone could have been either the sender or the receiver.

Comment Re: What a clusterfuck (Score 1) 676

Bell-LaPadula. This happen all the time.. Someone could have accidentally scanned a document that was TS and sent it to her on unclassified network. This creates a spillage and there are proper ways to handle this. Granted... those ways usually assume the person isn't running their own mail server..... so there is that.

Comment Re:Steam Link (Score 1) 170

I would agree with this. Steam machine may be awesome. I just am not sure how much faith I have in Valve at producing hardware. For the Shield, at this point Android TV is a bit lackluster... I haven't been that excited with it, but the streaming has been great. I can also emulate my older NES, SNES, N64 etc. which is pretty awesome.

Comment I have been in cyber security exercises (Score 1) 124

I thought they would be awesone until I realized what they were. Mostly a way to show off to higher ups. The bulk of them end up being about showing off pretty charts and dashboards no matter how useless those charts are. How you can make these work is tell your staff that management will be hiring a pen test sometime in the next six months but they won't get any more detail. This allows you to test your staff whole making them be more on their toes in case a real attack happens.

Submission + - The Security Industry is Failing it's Customers (

dremspider writes: An op-ed article stating that security industry is failing its customers overall and how the industry can overall get better. Increased spending on security hasn't been helping the industry as has been seen in light of larger security breaches. This article is promoting that instead of having individuals who are trained in information security the industry as a whole needs to shrink and instead the responsibility of security needs to be propagated throughout the organization. This means that instead of trying to train a few in information security,everyone must be trained and how it relates to their roles.

Comment My take on this... (Score 5, Insightful) 241

I have been in IT for about 10 years, so I am not sure I am completely qualified to say since forever, but I would say that the issue is we are now competing with cloud providers as to the expectation of our customers. For example, Gmail offers you 15 GBs for free and IT customers wonder why they only have 2GBs at work. Most cloud services have pretty amazing up times, and people wonder why your IT dept. can't do the same thing (no matter how well staffed it is). People are seeing the consuming of resources as free and then trying to IT accordingly.

Comment trust (Score 5, Insightful) 85

Most of these solutions require some sort of central authority to manage the security of all the routes. Sounds great until you realize that there is no one that all the users of the Internet can trust. I am not even sure that users can trust their own governments to manage this without exploiting users for the sake of surveillance let alone other countries trust one another. If you can't trust one another the best thing to do is remain insecure but watch each other like hawks for any foul play.

Comment Smart cards work (Score 2) 113

I have had a smart card setup for a little while. I use it for both OpenVPN and SSH access. I created the card by making my own CA and then using OpenSC to write to the card itself. There are some other cool things you can do like us it for PGP signing. I got a whole kit for about $100 bucks that came with a reader/writer, 2 cards and one USB thing.

Slashdot Top Deals

Save a little money each month and at the end of the year you'll be surprised at how little you have. -- Ernest Haskins