ebsl-technologies.blogspot.com
The Business Technologist - Cloud Computing,IT Security, Digital Forensics: Live Forensics within the Cloud Computing environment
http://ebsl-technologies.blogspot.com/2010/03/live-forensics-within-cloud-computing.html
The Business Technologist - Cloud Computing,IT Security, Digital Forensics. An independent business technologist view on IT technologies, to encompass, Cloud Computing,IT Security, Live Forensics,SCADA security and Access Management. Saturday, March 20, 2010. Live Forensics within the Cloud Computing environment. Traditionally analysts performed analysis on static data, either from a core dump, bit to bit imaging etc. Recently we have seen an increased focus directed at the live forensics environment.
ebsl-technologies.blogspot.com
The Business Technologist - Cloud Computing,IT Security, Digital Forensics: Amazon EC2, Google AppEngine and Microsoft Azure
http://ebsl-technologies.blogspot.com/2009/12/amazon-ec2-google-appengine-and.html
The Business Technologist - Cloud Computing,IT Security, Digital Forensics. An independent business technologist view on IT technologies, to encompass, Cloud Computing,IT Security, Live Forensics,SCADA security and Access Management. Friday, December 11, 2009. Amazon EC2, Google AppEngine and Microsoft Azure. Expanding on my introduction to cloud computing article, I wanted to take a look at three of the main platforms being offered for consumers i.e. the Platform as a Service model (PaaS). Before commen...
ebsl-technologies.blogspot.com
The Business Technologist - Cloud Computing,IT Security, Digital Forensics: March 2010
http://ebsl-technologies.blogspot.com/2010_03_01_archive.html
The Business Technologist - Cloud Computing,IT Security, Digital Forensics. An independent business technologist view on IT technologies, to encompass, Cloud Computing,IT Security, Live Forensics,SCADA security and Access Management. Tuesday, March 30, 2010. An Introduction to Cloud Computing. Lately in the IT community all the hype is on Cloud Computing. We have small start-ups offering several variations of Cloud services as well as some of the established big players (Google, Amazon, IBM, Novell.
ebsl-technologies.blogspot.com
The Business Technologist - Cloud Computing,IT Security, Digital Forensics: December 2009
http://ebsl-technologies.blogspot.com/2009_12_01_archive.html
The Business Technologist - Cloud Computing,IT Security, Digital Forensics. An independent business technologist view on IT technologies, to encompass, Cloud Computing,IT Security, Live Forensics,SCADA security and Access Management. Friday, December 11, 2009. Amazon EC2, Google AppEngine and Microsoft Azure. Expanding on my introduction to cloud computing article, I wanted to take a look at three of the main platforms being offered for consumers i.e. the Platform as a Service model (PaaS). Before commen...
ebsl-technologies.blogspot.com
The Business Technologist - Cloud Computing,IT Security, Digital Forensics: An Introduction to Cloud Computing
http://ebsl-technologies.blogspot.com/2009/12/introduction-to-cloud-computing.html
The Business Technologist - Cloud Computing,IT Security, Digital Forensics. An independent business technologist view on IT technologies, to encompass, Cloud Computing,IT Security, Live Forensics,SCADA security and Access Management. Tuesday, March 30, 2010. An Introduction to Cloud Computing. Lately in the IT community all the hype is on Cloud Computing. We have small start-ups offering several variations of Cloud services as well as some of the established big players (Google, Amazon, IBM, Novell.
ebsl-technologies.blogspot.com
The Business Technologist - Cloud Computing,IT Security, Digital Forensics: January 2010
http://ebsl-technologies.blogspot.com/2010_01_01_archive.html
The Business Technologist - Cloud Computing,IT Security, Digital Forensics. An independent business technologist view on IT technologies, to encompass, Cloud Computing,IT Security, Live Forensics,SCADA security and Access Management. Sunday, January 3, 2010. Cloud Security - Concerned Much? One train of thought regarding the cloud is that crackers may not be able to target a specific prey and thus our data will be safe. Hooray! A few of my associates ask the same question, as well as “how confident...
ebsl-technologies.blogspot.com
The Business Technologist - Cloud Computing,IT Security, Digital Forensics: Cloud Security - Concerned Much?!
http://ebsl-technologies.blogspot.com/2010/01/cloud-security-concerned-much.html
The Business Technologist - Cloud Computing,IT Security, Digital Forensics. An independent business technologist view on IT technologies, to encompass, Cloud Computing,IT Security, Live Forensics,SCADA security and Access Management. Sunday, January 3, 2010. Cloud Security - Concerned Much? One train of thought regarding the cloud is that crackers may not be able to target a specific prey and thus our data will be safe. Hooray! A few of my associates ask the same question, as well as “how confident...
ebsl-technologies.blogspot.com
The Business Technologist - Cloud Computing,IT Security, Digital Forensics: Social Engineering and Profiling at Airports
http://ebsl-technologies.blogspot.com/2010/03/social-engineering-and-profile-at.html
The Business Technologist - Cloud Computing,IT Security, Digital Forensics. An independent business technologist view on IT technologies, to encompass, Cloud Computing,IT Security, Live Forensics,SCADA security and Access Management. Wednesday, March 24, 2010. Social Engineering and Profiling at Airports. As any good IT Security professional and CISSP worth her salt knows, IT security is not only about computer related items but also the physical and non technical “hacking” skills as well. Typically when...
chappellu.com
Chappell University - Newsletter Signup
http://www.chappellu.com/newsletter.html
Get plugged in for fast training on network troubleshooting and security. The All Access Pass. Online training system provides a range of troubleshooting, analysis and security courses on-demand. Enter your email address to receive Laura's newsletter. Laura's newsletter contains tips and techniques for analyzing network traffic. The newsletter also lists the upcoming live events. Enter your email address below to receive the newsletter. We won't share your email address with anyone - period.
SOCIAL ENGAGEMENT