by VPNHaus | 10/16/2009 |Highlights
Windows 7, VPNs, and the 64-Bit Transition
Writer and blogger for PC Magazine, Michael J. Miller, revisits an earlier article he wrote in February—“Is Windows 7 Ready for Prime Time?” In a post published today, Michael further explores W7 VPNs and shares with us the clients he’s tried. Great read if you’re still looking for a VPN client for the new operating system.
Remote access sites: Blessing or curse? Take the poll
Thought this poll was a great one to highlight because we are just starting up our series on “Rethinking Your Remote Access”. Check out Joe Rosberg’s poll—do you think remote access sites are a blessing or a curse? Or a double-edged sword? We’d also love to hear your thoughts on this—DM @VPNHaus.
Around the Blogosphere…
New details have emerged this week about the Wal-mart security breach in 2005 and 2006. Apparently, Wal-Mart had a number of security vulnerabilities at the time of the attack, including at least four years’ worth of customer purchasing data, including names, card numbers and expiration dates, housed on company networks in unencrypted form. We’ve captured three articles and posts that provide insight into the story.
ThreatLevel | Wired
Big-Box Breach: The Inside Story of Wal-Mart’s Hacker Attack
Blogger Kim Zetter discusses new details that have come about concerning Wal-Mart being a victim of a serious security breach. She shares with us that Wal-Mart had no obligation to speak about the breach publicly at the time because no sensitive customer data was stolen. Do you feel that Wal-Mart should have shared this information with the public so that other companies could learn from their mistakes?
Anton Chuvakin Blog - "Security Warrior"
MUST Read on Walmart Intrusion
Blogger Anton Chuvakin uses the “juiciest quotes” from the Wired article (noted above), and makes light of the situation—he states, “move over ‘Heartland-gate’, make room for ‘Walmart-gate’.”
Open Season For Retail Cyber Thieves?
Evan Schuman discusses how the the breach apparently began when someone used a Nortel VPN connection from a Canadian Wal-Mart employee to gain access to key systems. He suggests that encryption and VPN administrative management were a bit loose—and the source code might not have been protected all that well. This new information stresses the importance of policy management.