Rick Rumbarger

Rick Rumbarger

Co-Founder
Joined on August 15, 2010
Total Post Views: 114,149

About

Rick Rumbarger is a nationally recognized Certified Information Systems Security Professional (CISSP) and technology insider with over 25yrs experience working on a variety of core hosted technologies for consumer, business, and government oriented organizations.

Except where otherwise noted, all postings by Rick Rumbarger on CircleID are licensed under a Creative Commons License.

Featured Blogs

Endpoint Rollbacks & Data Shadow Copies

Recently I was asked by a customer how they can easily set up rollback capabilities on the endpoints in their corporate network. They had seen the marketing hype by various security technology providers that their products included rollback capabilities they could utilize if/when one of their workstations or servers was infected by malware. Having gotten this question more than once, I thought it would be a good subject to share with a broader audience. more

Continued Threats from Malware

As part of my job, I manage an incident response team that was engaged by a significant organization in Georgia whose network was infected by the QBOT (a.k.a. QAKBOT) malware. The customer had been infected for over a year, several teams before ours had failed to solve the problem, and they continued to get reinfected by the malware when they thought they had eradicated it. Over time it had spread to more than 1,000 computers in their ecosystem stealing user credentials along the way. more

Better “Always-On” DDoS Mitigation

Distributed Denial of Services (DDoS) attacks have been the frustration of information technology professionals for many years. When asked, most tell you they wish their internet service providers (ISPs) would simply provide them "clean pipes" all the time and take care of DDoS attacks upstream before they ever get to them. Unfortunately, the resources (equipment and personnel) necessary to clean Internet connections all the time are very expensive and come with several downsides. more

Domain Name System (DNS) Security Should Be One of Your Priorities

Most people, even seasoned IT professionals, don't give DNS (the Domain Name System) the attention it deserves. As TCP/IP has become the dominant networking protocol, so has the use of DNS... Due to the reliability built into the fundamental RFC-based design of DNS, most IT professionals don't spend much time worrying about it. This can be a huge mistake! more

DDoS Attacks: Don’t Be In Denial of the Risks

Unlike traditional attacks by hackers which breach a business's security systems, resulting in defaced websites, intellectual property theft and/or customer data theft, a DDoS attack focuses on making a business's Internet connected infrastructure (e.g. web servers, email servers, database servers, FTP servers, APIs, etc.) unavailable to legitimate users. A business's brand reputation, which can take years to establish, can be swept away in just a few hours from a single DDoS attack in the same way a natural disaster like a flood or earthquake can impact a traditional brick and mortar business. more

DNSSEC - Let’s Stay the Course!

I don't know about you, but I'm starting to think that DNSSEC being so hot these days is a mixed blessing. Yes, it's wonderful that after so many years there is finally broad consensus for making DNSSEC happen. But being so prominent also means the protocol is taking shots from those who don't want to make the necessary software, hardware and operational modifications needed. And DNSSEC has taken some shots from those who just want to be contrarian. more

Network Complexity: Three Trends That are Contributing to a “Perfect Storm”

Most everyone who visits CircleID is familiar with Moore's Law, which stated simply holds that computing power doubles every 18 months. This has been going on since the 1960s and shows no sign of slowing. Moore's Law drives faster and faster computing, which produces more and more data and network complexity. This inexorable trend is putting immense pressure on corporate networks, and the strain is too much for many of them to handle on their own. more

Topic Interests

DNSIPv6 Transition IPv4 MarketsNetworksDNS SecurityCybersecurityCyberattackDDoS AttackThreat IntelligenceCybercrimeMalwareNew TLDsICANNDomain Names

Recent Comments

Anycast, Unicast, or Both?
New gTLD Discussion Draft - Top 10
Top Public DNS Resolvers Compared
Top Public DNS Resolvers Compared

Popular Posts

Endpoint Rollbacks & Data Shadow Copies

Continued Threats from Malware

Domain Name System (DNS) Security Should Be One of Your Priorities

DDoS Attacks: Don’t Be In Denial of the Risks

Network Complexity: Three Trends That are Contributing to a “Perfect Storm”