Profile of Mike FrattoFormer Network Computing Editor
News & Commentary Posts: 96
Mike Fratto is a principal analyst at Current Analysis, covering the Enterprise Networking and Data Center Technology markets. Prior to that, Mike was with UBM Tech for 15 years, and served as editor of Network Computing. He was also lead analyst for InformationWeek Analytics and executive editor for Secure Enterprise. He has spoken at several conferences including Interop, MISTI, the Internet Security Conference, as well as to local groups. He served as the chair for Interop's datacenter and storage tracks. He also teaches a network security graduate course at Syracuse University. Prior to Network Computing, Mike was an independent consultant.
Articles by Mike Fratto
posted in December 2008
The trust in digital certificates relies on the fact that the authority issuing the certificate has validated the identity of the person or company making the request and that the digital certificate can't be forged. New research presented at the 25th Chaos Computer Congress shows that forging digital certificates is possible and practical. Trust in the SSL i
NMAP, the open source network mapping tool, should be in any network or security administrator's toolbox. It's a feature-rich network scanner that goes far beyond port scanning such as service and OS detection, stealth and evasion modes, and sports an internal scripting engine. NMAP Network Scanning, a reference guide written by Gordon Lyon, a.k.a. Fyodor, is a must-have book to get the most out of NMAP.
Good security programs start with asking the right questions. All too often, security and network engineers sweat the details of some security technology or other and don't examine the most likely sources of attack. I recently overhead the question "How long should I set an IPSec VPN rekey time interval?" Answer the question by asking how worried you are about an attacker breaking into your VPN and how that might be accomplished.
In an unusual move, Microsoft has issued a patch for all versions of Internet Explorer from v5.5 onward and for all versions of the Windows operating system. Time to roll out that out-of-band patch before your users get infected. Reports of users being exploited are rising.
We all know that spammers will do whatever it takes to find a way to send their advertisements and scams to potential victims. Spammers are circumventing methods services like Gmail, HotMail, and Yahoo use to stop automated spam to the point that even legitimate users of these services are unwitting victims of anti-spam.
The company said its APM appliance gives administrators 10,000-foot to microscopic views of network applications on the same appliance.
Every once in a while, I come across some really bad conclusions based on some really bad research. The A First-Ever Research Study: Estimating Google's U.S. Consumer Internet Usage & Cost -- 2007-2010, from netCompetition.org, is one such document. Promising to be "straightforward, open, transparent, and replicable as possible" in its m
Alcatel-Lucent recently announced a sweeping set of enhancements across many of its switch and unified communications product lines. ALU, better known in the service provider arena, wants to send the message that it can compete with the likes of Cisco, Hewlett-Packard, and 3Com as a total solution provider for voice and data services rather than a point product vendor. Is a single source necessary or the best option?