How The IRS Data Breach Occurred

The IRS breach was exceedingly low-tech: it’s at the other end of the spectrum from the infamous and sophisticated Chinese hacking operations. This was just a bunch of bad actors who stole – or bought on the black market – personally identifiable information (PII) on a large number of American taxpayers. They accessed the IRS “Get Transcript” application, and provided answers (or educated guesses) in response to personal questions about their victims. This allowed them to access tax returns and other filings, facilitating lucrative identity thefts in the future.

Data Centers are Going Green – Consolidation & Dashboards

Running a large organization, private or public sector, requires a lot of IT and as technology has changed and matured data centers have exploded in number and size.

As data centers grow in operational costs in a climate of shrinking IT budgets, efficiencies are being sought out in all areas; from people to support the equipment, the real estate that equipment occupies in the data center, to the power needed to both run the servers and to cool the building.

How To Convert From JSON to YAML With Ease

I am not going to go into the holy war of the JSON vs YAML discussion. That is something that should be left to folks that have time and willingness to discuss this, just like discussions of OS X vs Windows vs Linux, or VMware vs Xen, or iOS vs Android, or …the list could continue way past this blog. But this blog is not to discuss either/or. It is to show you a way to convert from one to another to ease the pain of dealing with one or the other side. Let’s take a simple JSON template for DynamoDB table creation in AWS.

Rust Never Sleeps: How to Keep Your Application Platform Current

One of the most maddening aspects of being a software developer, and specifically a Java software developer, is the constant task of ensuring your application platform is up to date so that your application is not exposed to security or other defect vulnerabilities. It is challenging enough to ensure your code meets the customer requirements and is maintainable by different resources by ever-decreasing timelines over the course of its life.

The 6 Elements of a Government Insider Threat Program

Insider threats are a persistent problem for government agencies and it’s no longer an IT problem. According to DailyCaller.com, 21% of breaches can be traced back to security indiscretions by federal workers (although other source point to the number being as high as 50%).

So it’s no surprise that preventing and mitigating these threats was a hot topic at this year’s Symantec Government Symposium in Washington, D.C.