Welcome to My ITBE Security Blog

Ralph DeFrangesco

Dear Friends/Colleagues old and new,


Welcome to my new security blog at IT Business Edge. I know that many of you get a lot of reading material that comes across your desk on a daily basis and I thank you for choosing my blog to read. This blog will cover the security issues that security professionals are forced to deal with every day and look toward what to expect in the future. Topics will include but not be limited to: social engineering, NAC, rootkits, auditing, business continuity and disaster recovery, the new PCI standard, and many, many more, with an eye toward the relationship between the immediate threat and the larger meaning to the business.


Those of you that have read any of my material before know that I put thought and research into my work but despite my best efforts, I do make mistakes. After working in the IT sector for over 24 years, I know that security people take pride in making sure that facts and figures are correct so I know that you will keep me honest.


I look forward to sharing information and ideas with many of you. Please feel free to send me an e-mail any time; my account is always open.


Your friend and blogger,


Ralph M. DeFrangesco

Add Comment      Leave a comment on this blog post
Nov 26, 2008 10:28 AM Jason Hall Jason Hall  says:
Hi Ralph,I am pleased to see you blogging for IT Business Edge. I know that your experience and background will be an asset to the IT community. I look forward to reading your articles. Jason HallStuart Hall Technologies, Inc.www.shtechnologies.net Reply
Nov 28, 2008 12:34 PM Dave Dave  says:
Hi Ralph, I am pleased to be one of the first posts on your new venture - and wish you the best of luck with this and your upcoming radio show!Here's my question to get the ball rolling; Is there a proven system that can show that privileged users have not jeopardized the privacy/integrity of sensitive data? Reply
Dec 2, 2008 11:20 AM Ralph DeFrangesco Ralph DeFrangesco  says:
Dave,Great question. I would need more informtion to fully understand what you are trying to accomplish and make a recommendation. However, you can verify the integrity of data by using a message digest such as MD5. Please feel free to send me an E-mail if you need more.-Ralph Reply
Dec 5, 2008 10:07 AM Joe Lui Joe Lui  says:
Hello Ralph, Great to see your contributions to the IT community on IT Business Edge! Looking forward to your articles and insights!Good Luck! Reply

Post a comment





(Maximum characters: 1200). You have 1200 characters left.




Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.