Ed Moyle

Ed Moyle
account difficult enterprise fact job keeping large machines might secure thousands time
When you take into account the fact that a large enterprise might have tens of thousands or hundreds of thousands of machines, the job of securing those machines is very difficult and keeping them secure over time is even more difficult still.
again approach authority coordinate encourage impact likely merely policy softly stronger time transition via wishes
If the U.N. intends to softly encourage the transition to IPv6 via policy -- or merely wishes to coordinate or 'track' the deployment of IPv6 over time -- the impact will likely be minimal, ... But if they are going to take a stronger approach -- which they could theoretically do with the new authority -- the impact would once again be tremendous.
advantages attempted beneficial business directly found number offering provide restrict sanctioned
Even if IM isn't used directly for business purposes, a number of organizations still find it beneficial to provide a standardized IM channel. When IM was emerging, many enterprises attempted to restrict IM use, but found there were administrative advantages to offering a sanctioned and standardized IM portal.
across bar enterprise high might rather security setting systems
Rather than setting a universally high security bar across all systems in the enterprise, an enterprise might segregate systems into different 'zones,'
changes difference existing fraud funds maybe mechanisms technology using
There's no fundamental difference between using QuickBooks to embezzle funds and using a ledger to embezzle funds, ... The technology just changes how the fraud is accomplished and maybe who commits it; it doesn't change why it's committed. As long as there are criminals, they will find a way to use the existing mechanisms to their advantage.
advise documents enterprise issues leverage method office patches possible soon strongly within worms
Mass-mailing worms will often leverage issues in Office as part of their method of propagation. As such, I strongly advise that these patches be installed as soon as possible -- particularly within the enterprise where the e-mailing of Office documents is more commonplace and expected.
allowing altogether coming concern content exclude extension files filter filtering gateway majority office pass search smooth software transition
It allows virus-checking software in an e-mail to filter on that extension and to search files coming in with that extension more carefully, or to exclude them altogether on a content filtering gateway while allowing the majority of the office docs to pass through without hindrance. My only concern is making a smooth transition to the new format.
aim breach closer entirely expensive relatively small threat toward zero
Getting the threat of breach entirely to zero is effectively impossible, even in relatively small enterprises. And the closer we aim toward zero, the more expensive and time-consuming it becomes.
allow approval bush change country decide decisions department level president since subject ultimately voice whether
Since all ICANN decisions are subject to approval by the U.S. Department of Commerce, President Bush can ultimately decide whether or not to allow that change to proceed. No other country has that level of voice in the process.
balanced diverse diversity events impact increase maximum reduce small thereby
Make diversity too small and you increase the impact of population-level events, make it too diverse and you can reduce manageability and thereby make individual-level events more likely. Heterogeneity has to be balanced with manageability for the organization's maximum benefit.
attempt best decisions management ongoing quantify security understand worked
The best security organizations I've worked with understand and attempt to quantify the risk-management decisions they make on an ongoing basis.
management reflects worry
Worry in a CIO reflects uncertainty in the management process.
black community contingent events hackers hacking hat information mainstream neither security seems sides since
There's also usually a black hat contingent at most mainstream security conferences. Since information security and hacking are two sides of the same coin, many hackers go to security conferences and many security professionals go to hacker events -- neither community seems to mind.
convinced deal department equipped including issues number oversight possible
As a technologist, I'm not convinced that the U.N. is necessarily better equipped to deal with these issues than any number of other possible oversight bodies, including the U.S. Department of Commerce.