I've been super busy putting my twisted thoughts on paper...here are a few pieces you might enjoy:When your lawyer becomes your CISO The compliance crutch holding up Corporate AmericaThe fallacy of information security awareness and trainingThe one skill worth mastering in ITQuantifying the disconnect between the business and securityThe critical item that’s missing from most IT security programsWhat's your one hot button security item? Top detractors of security oversight The funny ...
Continue Reading...I heard a news story this morning about the possible bomb that was found at Newark Airport. The reporter went on to say that TSA is "ratcheting up security" and searching bags with more scrutiny in the event the threat is real.What I want to know is (and can't seem to find the answer to): why is it we "ratchet up security" when a such threat is detected rather than ...
Continue Reading...Okay, so your managers aren't getting security and your users aren't on board either. Security's not looking too good but you know it needs to happen. Just how can you "sell" security to those who matter most? Here's a collection of articles and blog posts I've written that address this very subject:How to get - and keep - user support with securityHow to get management on board with Web 2.0 ...
Continue Reading...In the seemingly unavoidable media drone tirades hammering Tiger Woods and his marital situation I realized the tie-ins that such high-profile marriages have with what we do in the information security field. It boils down to two things:It's all about the moneyThe focus going in is on who can get the most out of it - "what's in it for me?"We see this all the time when it comes to ...
Continue Reading...Wow, it's been nearly a month since my last posting of security content. Lots of writing but slow publication cycles I suppose. First off, here's an article I wrote for SearchEnterpriseDesktop.com:How to strike a balance between Windows security and business needsHere's a webcast/podcast combo I presented for SearchMobileComputing.com and sponsored by Dell:Data Protection for the Mobile Workforce - webcastData Protection for the Mobile Workforce - podcastMuch more to come soon!In ...
Continue Reading...Here's an interesting question someone asked me recently regarding some in-fighting about security along with my brief response on how to fix the problem. I see this ALL the time!:"I work in a company as the sole information security analyst. My job is to identify risks, set policy, and audit our IT environment against the policies I wrote. I am currently working with IT operations staff on mitigating risks based ...
Continue Reading...Here's my latest stuff:Metasploit 3.1 updates improve Windows penetration testing Making the Business Case for Information Security[This is an interactive issue of the magazine. You'll need to click on Current Issue, then Contents, then the Contents graphic. You'll see my article listed. Click on it to go to it.]...and a related article:The Business Case for Information Security - What businesses are up against and why it is neededFinally, a podcast:Mobile ...
Continue Reading...