tag:blogger.com,1999:blog-221897962024-02-19T11:44:35.458+00:00360is BlogSecurity, Virtualization, & Performance, at 360isNickhttp://www.blogger.com/profile/08730250418591276136noreply@blogger.comBlogger92125tag:blogger.com,1999:blog-22189796.post-62731405955714891732016-10-31T18:07:00.002+00:002016-11-01T12:35:53.335+00:00The Free Cyber Security Benchmark, increasing awareness of vulnerability for UK organisations
UK Government has been working to increase awareness of Cyber Security threats to organisations for years. It should be obvious why, almost 80% of UK GDP is services, and a significant portion of the non-services-based economy is just as dependant on intellectual property. While physical property, plant and equipment is difficult to steal or damage, most intellectual property is storedNickhttp://www.blogger.com/profile/08730250418591276136noreply@blogger.com0tag:blogger.com,1999:blog-22189796.post-84115863903459687792016-06-07T17:27:00.000+01:002016-06-07T17:27:32.478+01:00Open Source Application Security & Continuous Integration
Smoother App Security & Continuous Integration
Date: Thursday 7th July (8:30-11:00 AM)
Location: The Gherkin, Chivas Room 30 St Mary Axe, London, EC3A 8EP
360is consultants have been working-with and contributing-to Open Source Software projects for over 20 years. We helped build the worlds largest ISP using Open Source in the 1990s and today provide financial support to some of our Nickhttp://www.blogger.com/profile/08730250418591276136noreply@blogger.com0tag:blogger.com,1999:blog-22189796.post-74265916093943311602016-04-04T18:21:00.002+01:002016-04-04T18:21:22.980+01:00Mossack Fonseca Clients Awake To Find Themselves Adrift Offshore In A Leaky BoatToday the executives of Panamanian-headquartered international legal and trust services firm Mossack Fonseca awoke to news that 11 million confidential documents spanning 40 years of the firms operation had been leaked to 107 media organisations in 78 countries. The documents purport to show how Mossack Fonseca has helped clients launder money, dodge sanctions and evade tax. Neither the identity Nickhttp://www.blogger.com/profile/08730250418591276136noreply@blogger.com0tag:blogger.com,1999:blog-22189796.post-61090102571420021492016-02-08T17:05:00.002+00:002016-02-08T17:18:46.193+00:00What does every UK Cyber Security startup need, that is worth more than gold?
It's not that I'm ungrateful George...
While compiling the next issue of Executive Intelligence, the Cyber Security briefing for UK decision makers, we came across an announcement from Chancellor George Osborne for a £250,000 programme to increase the rate of cyber security startup development in the UK. We aren't sure whether this announcement, made around the 27th January 2016 was Nickhttp://www.blogger.com/profile/08730250418591276136noreply@blogger.com0tag:blogger.com,1999:blog-22189796.post-85430498243614647282015-11-25T15:56:00.001+00:002015-11-25T16:08:11.199+00:00Social Engineering, Countering The Threat
Would You Buy A Used Monument From This Man?
"Count" Victor Lustig, con-man and Social Engineer, famously sold the Eiffel Tower. Twice.
Like accomplished Social Engineers of today, he was meticulous in his planning, thorough in his research, had an excellent understanding of human nature. He managed all of this without Google, FaceBook, Twitter, or his own printer back in 1925. Modern Social Nickhttp://www.blogger.com/profile/08730250418591276136noreply@blogger.com0tag:blogger.com,1999:blog-22189796.post-74432985744930256892015-11-25T14:14:00.001+00:002015-11-25T14:14:09.310+00:00Social Engineering + Converged Communications = Bad For Security
John, I'm afraid I've got some very bad news for you.
We've recently learned that even the Director of the CIA can't keep hackers out of his e-mail. A teenager hacked into CIA Director John Brennan's AOL account. He says he did so by posing as a Verizon employee to other Verizon staff to get personal information about Brennan's account, as well as his bank card number and his AOL e-mail Nickhttp://www.blogger.com/profile/08730250418591276136noreply@blogger.com0tag:blogger.com,1999:blog-22189796.post-30421204830450767372015-10-19T14:52:00.001+01:002015-10-19T14:52:31.719+01:00High Performance, Low Latency, Hyper-Converged Computing
Recently 360is implemented several systems for clients who needed very high performance, within a stated budget, and had limited physical space and power to work with. For these clients we designed hyper-converged compute/storage units built from non-proprietary, commercial off the shelf components, supportable by their in-house IT team. Thanks to recent advances in storage technology it isNickhttp://www.blogger.com/profile/08730250418591276136noreply@blogger.com0tag:blogger.com,1999:blog-22189796.post-48742966784328153982015-09-23T17:42:00.001+01:002015-09-23T17:52:52.204+01:00Countering The Social Engineering Threat
An increased number of clients are experiencing social engineering attacks either directly against their finances and information assets, or the IT infrastructure upon which those assets depend for confidentiality and security.
Once only immediately saleable commodities such as credit card numbers were targeted. Now criminals are seeking medical records, credit history files, general personal Nickhttp://www.blogger.com/profile/08730250418591276136noreply@blogger.com0London, UK51.5073509 -0.1277582999999822351.1912379 -0.77320529999998222 51.8234639 0.51768870000001777tag:blogger.com,1999:blog-22189796.post-2277383157028199852015-06-11T12:05:00.000+01:002015-06-11T12:05:11.232+01:00City Security Magazine, How To Avoid Leaks
Leaks are news, whether they are about Governments, Corporations, or individuals. City Security Magazine, the print and digital magazine that promotes security issues across the UK, carries an article from 360is on how to reduce your chances of becoming the next SONY, NSA, US State Department, or celebrity to suffer a breach of Information Security and have private and confidential informationNickhttp://www.blogger.com/profile/08730250418591276136noreply@blogger.com0London, UK51.5073509 -0.1277582999999822351.1912379 -0.77320529999998222 51.8234639 0.51768870000001777tag:blogger.com,1999:blog-22189796.post-70106467256042535752015-04-08T10:52:00.000+01:002015-04-08T10:53:08.292+01:00Meet 360is At InfoSecurity Europe 2015
Three Sixty Information Security Ltd will be at InfoSecurity Europe, Olympia, London, 2nd to 4th June 2015. We'll be meeting clients, partners, and friends among the 12000 expected visitors and 330 stands at the show this year.
If you want to discuss the results of a penetration test, arrange a confidential meeting about a breach, or just need advice on how your organisation should Nickhttp://www.blogger.com/profile/08730250418591276136noreply@blogger.com0tag:blogger.com,1999:blog-22189796.post-71795739142152824302015-02-05T15:08:00.001+00:002015-02-05T15:09:22.501+00:00How do we validate a supplier has ISO 27001?
(c) Scott Adams
Most of the questions we get from our clients about ISO 27001, the standard for Information Security Management Systems, are about how they can implement this standard and possibly achieve certification. We covered some of that in our previous blog.
The "other" question we get asked less often is "how do we validate a supplier or partner that claims to follow ISO27001 orNickhttp://www.blogger.com/profile/08730250418591276136noreply@blogger.com0tag:blogger.com,1999:blog-22189796.post-91399944779914653112015-02-04T15:49:00.004+00:002015-02-04T15:49:54.381+00:00ISO 27001, how do we prepare and what does it cost?
Need help preparing for ISO 27001? (c)Scott Adams
ISO/IEC 27001 is a standard providing requirements for an Information Security Management System (ISMS). It is part of the ISO 27000 family of standards, all of which help organisations keep information assets secure.
Like other ISO standards, some organisations choose purely to implement the standard in order to benefit from what it Nickhttp://www.blogger.com/profile/08730250418591276136noreply@blogger.com0tag:blogger.com,1999:blog-22189796.post-85955005263106151912015-01-20T17:02:00.001+00:002015-01-20T17:02:57.235+00:00High Performance Computing Advisory Council Conference, CSCS Switzerland, March 23rd - 25th
Lugano, Location of the 2015 HPCAC Conference
Three Sixty will be attending the 2015 High Performance Computing conference held in Lugano, Switzerland from March 23rd to 25th.
The conference brings together system managers, researchers, developers, computational scientists, students and industry partners for cross-training and to discuss recent HPC developments and future advancements. This Nickhttp://www.blogger.com/profile/08730250418591276136noreply@blogger.com0Switzerland46.818188 8.227511999999933344.0360805 3.0639379999999337 49.6002955 13.391085999999934tag:blogger.com,1999:blog-22189796.post-77438278192954501772014-11-05T11:54:00.001+00:002014-11-05T11:54:54.151+00:00Join 360is at PETEX 2014
Come and meet 360is at PETEX where we will be talking about Virtualisation & Cloud, Cyber Security, and High Performance IT projects delivered to the Oil & Gas industries. If you are an IT manager or analyst working in the sector, the conference program will include sessions and seminars on a range of topics:
3D workflows
Corporate data management
National data repositories
Modelling Nickhttp://www.blogger.com/profile/08730250418591276136noreply@blogger.com0London, UK51.5073509 -0.1277582999999822351.1912379 -0.77320529999998222 51.8234639 0.51768870000001777tag:blogger.com,1999:blog-22189796.post-8448035203345355792014-09-11T17:00:00.000+01:002014-12-09T15:31:33.359+00:00360is Builds VDI for InnovateUK
UK Satellite and GIS Imagery
The UK Satellite Applications Catapult (The Catapult) was established to promote growth in commercial applications of satellite technology. Its mission is to accelerate the take-up of emerging technologies by businesses and in so doing, drive UK economic growth. The Catapult offers expertise and facilities that will bring strategic benefit to the community of Nickhttp://www.blogger.com/profile/08730250418591276136noreply@blogger.com0Harwell, Didcot, Oxfordshire OX11, UK51.601327 -1.288948000000004951.5816005 -1.329288500000005 51.621053499999995 -1.2486075000000048tag:blogger.com,1999:blog-22189796.post-88733451401810753012014-07-16T17:29:00.000+01:002014-07-21T20:47:18.246+01:00360is deploys Schlumberger Petrel over Virtual Desktop InfrastructureCanadian Natural Resources Inc (CNRI) are an energy company operating in the North Sea, Canada, and Africa. 360is designed and deployed a high-performance, GPU-accelerated, VDI platform for their geologists. It allowed staff to work remotely and CNRI to achieve a 2:1 ratio of analysts to Schlumberger Petrel licenses.
Schlumberger Petrel Delivered over VDI by 360is
How did the project come Nickhttp://www.blogger.com/profile/08730250418591276136noreply@blogger.com0tag:blogger.com,1999:blog-22189796.post-10625135614957273242014-07-15T19:39:00.000+01:002014-07-15T19:39:04.080+01:00XenServer Creedence Alpha 3, Disk I/O testing (part 2)We did some more testing of XenServer Creedence Alpha (XSCA3) disk performance, and plotted large streaming reads for a variety of record sizes against both a physical and Brand-X Hypervisor.
Recap:
System is an AMD6176SE, 2 CPU, 192GB RAM
Local storage, 3x 10Krpm SATA, LSI 9261-8i, RAID0, thick provisioned
No special settings, tuning, or configuration
Testing is with dd and Nickhttp://www.blogger.com/profile/08730250418591276136noreply@blogger.com0tag:blogger.com,1999:blog-22189796.post-39648553890076652572014-07-07T11:36:00.001+01:002014-07-07T11:36:47.763+01:00360is gets new shoes, jug, and knives!
We don't sell coffee.
"But who is wurs shod, than the shoemakers wyfe, With shops full of newe shapen shoes all hir lyfe?"
[1546 J. Heywood Dialogue of Proverbs i. xi. E1V]
It seems everybody has a claim to this one.
There are only wooden knives in the blacksmith's house. Spanish Proverb
At the potter's house water is served in a broken jug. &Nickhttp://www.blogger.com/profile/08730250418591276136noreply@blogger.com0London, UK51.5073509 -0.1277582999999822351.1912379 -0.77320529999998222 51.8234639 0.51768870000001777tag:blogger.com,1999:blog-22189796.post-57375230013115793412014-07-03T18:54:00.001+01:002014-07-04T01:20:38.637+01:00XenServer Creedence Alpha 2, Disk Performance
360is gets paid to make information technology go faster.
Sometimes its hardware which doesn't hit the stated performance, or software which cant fully utilise the capability of modern hardware. Sometimes it's a lifetime extension for an old platform, squeezing in another 18 months growth before a replacement arrives. If we are really lucky we get to re-design an entire end-to-end process and Nickhttp://www.blogger.com/profile/08730250418591276136noreply@blogger.com2tag:blogger.com,1999:blog-22189796.post-20352484079080841412014-06-03T22:57:00.000+01:002014-06-03T23:01:17.073+01:00Disaster Recovery Rehearsals, A Guide To Avoiding Failure
Who left the tap on?
How confident are you that if or when you need to enact your IT Disaster Recovery (DR) process, you will meet or exceed the expectations of management, customers, and shareholders?
Someone, somewhere, is in the middle of a disaster right now. It happens to every day. Yet even though the price and effort-cost of providing DR has shrunk over the last 20 years, many Nickhttp://www.blogger.com/profile/08730250418591276136noreply@blogger.com0London, UK51.508515 -0.1254871999999522851.192402 -0.77093419999995227 51.824628000000004 0.51995980000004771tag:blogger.com,1999:blog-22189796.post-17034121464286315142014-04-28T11:07:00.001+01:002014-04-28T11:10:41.072+01:00360is at Infosecurity Europe 2014
London Underground Backup Plan
Three Sixty Information Security Ltd will again be at Earls Court, London for the Infosecurity Europe show, 29th April to 1st May 2014. We'll be meeting clients, partners, and friends among the 12000 expected visitors and 329 stands at the show this year.
If you want to discuss the results of a penetration test, arrange a confidential meeting about a Nickhttp://www.blogger.com/profile/08730250418591276136noreply@blogger.com0Earls Court, London SW5, UK51.490340499999988 -0.1958621999999650125.968305999999988 -41.504456199999964 77.012374999999992 41.112731800000034tag:blogger.com,1999:blog-22189796.post-24978616309894288582013-06-18T11:49:00.003+01:002013-06-18T14:34:33.508+01:00A Quick Enumeration Of The PRISM Program
Enumeration of PRISM
As IT security consultants, former representatives at the GSMA, contributors to IETF's "Raven", and one-time employes of the worlds largest ISP, the inevitable questions started coming up in meetings and conversations shortly after the 8th June.
"...two reporters from the Guardian newspaper announced to the world the source of one of the most significant Nickhttp://www.blogger.com/profile/08730250418591276136noreply@blogger.com0tag:blogger.com,1999:blog-22189796.post-51700759912679456772012-11-12T13:22:00.000+00:002012-11-12T13:22:41.776+00:00Higher Hard Drive Prices, Still The New NormalAbout 7 months ago, back at the end of Q1 2012 we researched hard drive prices and compared them to pre-flood levels. We concluded that higher prices would be here to stay for the next few years for a couple of reasons:
Nobody is investing in next-generation facilities with only 2 serious players in the spinning rust market, there is no need reduce manufacturing cost in the medium term with nextNickhttp://www.blogger.com/profile/08730250418591276136noreply@blogger.com0tag:blogger.com,1999:blog-22189796.post-86609771121270396822012-09-03T23:21:00.000+01:002012-11-29T13:23:30.028+00:00Why VMware (still) Wont Convince The Cloud Providers
<!--
/* Font Definitions */
@font-face
{font-family:"Courier New";
panose-1:2 7 3 9 2 2 5 2 4 4;
mso-font-charset:0;
mso-generic-font-family:auto;
mso-font-pitch:variable;
mso-font-signature:3 0 0 0 1 0;}
@font-face
{font-family:Wingdings;
panose-1:5 2 1 2 1 8 4 8 7 8;
mso-font-charset:2;
mso-generic-font-family:auto;
mso-font-pitch:variable;
mso-font-signature:0 0 65536 0 Nickhttp://www.blogger.com/profile/08730250418591276136noreply@blogger.com0tag:blogger.com,1999:blog-22189796.post-597354138400569982012-07-25T21:46:00.000+01:002012-10-11T15:20:20.760+01:00FreeBSD 9.0, Paravirtualized Drivers, & Xen-Tools On XenServer 6
We are often asked by clients to help them squeeze more performance from an existing infrastructure, to speed up an application or shorten an IT-dependent business process. Early on in the discussion there's a tendency for sysadmins and architects to dive in to technical minutiae, the black magic and chicken-waving of memory page sizes, block alignment, cache segmentation, and thread pinning. Nickhttp://www.blogger.com/profile/08730250418591276136noreply@blogger.com19