Profile of Mike FrattoFormer Network Computing Editor
News & Commentary Posts: 96
Mike Fratto is a principal analyst at Current Analysis, covering the Enterprise Networking and Data Center Technology markets. Prior to that, Mike was with UBM Tech for 15 years, and served as editor of Network Computing. He was also lead analyst for InformationWeek Analytics and executive editor for Secure Enterprise. He has spoken at several conferences including Interop, MISTI, the Internet Security Conference, as well as to local groups. He served as the chair for Interop's datacenter and storage tracks. He also teaches a network security graduate course at Syracuse University. Prior to Network Computing, Mike was an independent consultant.
Articles by Mike Fratto
posted in October 2008
NIST is wrapping up accepting submissions for a new cryptographic one-way hash algorithm today. NIST's competition follows a tradition of peer review, public discussion, and acceptance of algorithms that brought us DES, SHA, and AES. The selection process won't be complete until 2012, but final selection should addresses weaknesses in the hash algorithms used today.
Cisco follows up on its survey on data leakage, which I already wrote about, and an analysis of policy effectiveness. There isn't too much surprising in the findings, but the results continue to highlight the need for sound security policy management processes in organizations and,
ICANN, the organization that manages the technical aspect of the DNS, among other things, has opened up a 45-day public comment period on the process for requesting a new generic Top Level Domain (gTLD) such as .com, .net, and .gov. The comment period is the next step along the path of adding more gTLD's to DNS. If you are involved with DNS, or work for a global or national brand, you want to pay attention to t
The Metro Ethernet Forum (MEF) really is a good model for standardization bodies. The MEF brings service providers and equipment makers together to create standards for all facets of Carrier Ethernet as well as providing conformance testing and certification. Kevin Vachon, COO of the MEF, provided some interesting insights into the direction of the MEF and, therefore, the direction of Carrier Ethernet.
Ethernet Expo is the place to be to get current on the technology and service offerings. While the main show is aimed more toward service providers, enterprise attendees to the show can gain some valuable insights on upcoming standards work, deployments, and last mile connectivity.
LightReading and InformationWeek are putting on Enterprise Day at the end of Ethernet Expo on Oct. 22 at the Hilton in New York. Registration for the event is open. Spending the day will get you up to speed on the happenings in Car
John Timmons at Ars Techinca wrote about the interorganizational wrangling beginning as .gov studies DNS fix. At issue: Who should implement and manage the root signing process rasises the question about who should hold the root keys to such a critical service. But my question is, why does the root zone need to be signed at all?
The pendulum swing between responsibly disclosing a vulnerability privately to affected vendors so they can create a fix versus telling the world so IT can be aware of potential problems is swinging back into the vendors' favor. The result is that without public awareness, vendors aren't motivated to institute fixes on a timely basis.