East of Eden

The latest in Windows 10, end user devices and services, cyber security, data center & cloud, and all things IT.

Andy Sherman

Andy Sherman, Eden Technologies’ security practice lead has a PhD in physics from Rensselaer Polytechnic Institute and started his career in the academic world. He then went to AT&T Bell Laboratories where he discovered the power – and hazards – of large distributed computer networks. It was also at Bell Labs, during the early days of the Internet, that Andy became interested in the security problems associated with public networks. From Bell Labs Andy moved to the financial services industry. There he worked on a large range of infrastructure design, deployment, and management projects, but is best known for his 15+ years in information and technology security.

Blog Feature

End User Devices and Services

Secure Boot: Stop Rootkits Dead in Their Tracks by Converting from BIOS to UEFI

By: Andy Sherman
October 25th, 2016

As outlined in our previous article, Windows 10 Security, The Good, The Bad, and The Ugly, there are several exciting new security features in Windows 10 Enterprise, such as Device Guard and Credentials Guard, that leverage features of more recent hardware. In order to take full advantage of all that Windows 10 Enterprise has to offer, you will probably need to convert a lot of existing boot drives from BIOS to UEFI, and when you do that, you will also want to enable the Secure Boot feature of your workstation hardware. Sound opaque and confusing? This article will explain what it means and talk about some strategies for making the conversion in your enterprise.

Read More

Share

Blog Feature

End User Devices and Services | Windows 10

Use Windows 10 Device Guard to Trust Your Software

By: Andy Sherman
October 17th, 2016

As we noted in our Windows 10 Security overview, one of the exciting new features of Windows 10 Enterprise is Device Guard, an operating system feature for ensuring that only trusted code runs on your systems. At its best, Device Guard uses a signature based model for trusting executables and libraries. However, in an ecosystem with as much legacy as exists in Windows, Device Guard also gives the enterprise the means to handle legacy applications as well.

Read More

Share

Planning for Windows 10 Starts Now

Planning for Windows 10 Starts Now

Develop a transition strategy for a successful Windows 10 upgrade, and make this migration your best.

Blog Feature

Cyber Security

SPF and DKIM are useful, but not a panacea

By: Andy Sherman
September 29th, 2016

The following article was written by Eden's own Andy Sherman. It originally appeared on his blog, "My Security Musings." I received an interesting phishing email today. It was from a business acquaintance and contained a link gussied up to look like an online document. The content and format of the email screamed "suspect me" so I did. A URL lengthener confirmed that the tinyurl.com link went someplace having no connection to me or the acquaintance.

Read More

Share

Blog Feature

Cyber Security

6 Simple Steps to Reduce Your Ransomware Risk

By: Andy Sherman
August 4th, 2016

What is Ransomware? It seems that hardly a day goes by that we don’t read about a new strain of ransomware or a new victim of a ransomware attack. Ransomware is malware that encrypts the user’s or organization’s files and demands payment for the decryption key. The ransomware business model is often one that provides friendly customer service and really does deliver the key in exchange for the requested amount of Bitcoin. However, there is no guarantee that they will, and they don’t always, so it’s not a long term strategy for protecting your enterprise to depend upon the good will of criminals.

Read More

Share

Blog Feature

Cyber Security | Windows 10

Windows 10 Security: The Good, the Bad, & the Ugly

By: Andy Sherman
July 11th, 2016

There’s a lot of buzz around Windows 10 security. For example, Infoworld dubs Windows 10 as “the most secure Windows ever.” Although that sounds like the hype cycle at work, in fact, some of the new security features in Windows 10 are game changers that will help change the balance of power between enterprise customers and the perpetrators of Advanced Persistent Threats (APT). There’s also at least one monstrously bad idea baked into Windows 10, and the usual collection of features where we think the default behavior is too open and should be modified.

Read More

Share

Blog Feature

Data Center & Cloud | Cyber Security | Publications & Resources

Protect Your Security Infrastructure: Observe Proper Segregation of Duties

By: Andy Sherman
March 9th, 2016

The following excerpt has been taken from our ebook, The Ultimate Guide to Protecting Your Security Infrastructure in the Broader Data Center. Observe Proper Segregation of Duties System administration and security administration are not the same job, and those functions should be done by different people.

Read More

Share

Blog Feature

Data Center & Cloud | Cyber Security | Publications & Resources

Protect Your Security Infrastructure: Isolate Security Services

By: Andy Sherman
March 4th, 2016

The following excerpt has been taken from our ebook, The Ultimate Guide to Protecting Your Security Infrastructure in the Broader Data Center. Isolate Security Services on a Protected Network While the subject of proper network security design over the entire data center will be the subject of a future article, we still need to consider the special needs of security infrastructure here.

Read More

Share

Blog Feature

Cyber Security

Juniper Firewall / VPN Backdoor Vulnerabilities

By: Andy Sherman
December 21st, 2015

Juniper’s NetScreen series of firewall and VPN devices have not one but two backdoor vulnerabilities, Juniper disclosed. One of these vulnerabilities is an authentication bypass for telnet or SSH logins to the firewall. The other is an encryption weakness that allows for eavesdropping on VPN traffic. Needless to say there has been a lot of discussion in the technicalpress, especially in light of the current political climate around encryption and back doors. Patches are available to cover both vulnerabilities. Juniper notes that no other Juniper products, in particular JunOS based products, are affected by these vulnerabilities.

Read More

Share

Blog Feature

Data Center & Cloud | Cyber Security

Data Loss Prevention in 2016 and Beyond

By: Andy Sherman
December 21st, 2015

Digital Guardian asked a bunch of security experts (including me) for their predictions on where the Data Loss Prevention (DLP) market was going in 2016 and beyond.

Read More

Share

Blog Feature

Cyber Security

Wire Transfer Fraud, Up Close and Personal

By: Andy Sherman
September 8th, 2015

We recently posted about an uptick in wire transfer fraud through bogus email. Since then we and two of our clients have been the subject of such attacks. All were emails purporting to be from executive leadership (CEOs or Partners) to the people in their organization responsible for finance.

Read More

Share