• 22 Aug 2014

    CISOs, lawyers, awareness training, and other infosec blunders you need to know about

    I've been super busy putting my twisted thoughts on paper...here are a few pieces you might enjoy:When your lawyer becomes your CISO  The compliance crutch holding up Corporate AmericaThe fallacy of information security awareness and trainingThe one skill worth mastering in ITQuantifying the disconnect between the business and securityThe critical item that’s missing from most IT security programsWhat's your one hot button security item? Top detractors of security oversight The funny ...

    Continue Reading...
  • 20 Dec 2010

    Possible bomb at Newark, ratchet up security!!??

    I heard a news story this morning about the possible bomb that was found at Newark Airport. The reporter went on to say that TSA is "ratcheting up security" and searching bags with more scrutiny in the event the threat is real.What I want to know is (and can't seem to find the answer to): why is it we "ratchet up security" when a such threat is detected rather than ...

    Continue Reading...
  • 24 Aug 2010

    Selling security: To persuade to is succeed

    Okay, so your managers aren't getting security and your users aren't on board either. Security's not looking too good but you know it needs to happen. Just how can you "sell" security to those who matter most? Here's a collection of articles and blog posts I've written that address this very subject:How to get - and keep - user support with securityHow to get management on board with Web 2.0 ...

    Continue Reading...
  • 16 Dec 2009

    How Tiger Woods’ marriage is like risk management

    In the seemingly unavoidable media drone tirades hammering Tiger Woods and his marital situation I realized the tie-ins that such high-profile marriages have with what we do in the information security field. It boils down to two things:It's all about the moneyThe focus going in is on who can get the most out of it - "what's in it for me?"We see this all the time when it comes to ...

    Continue Reading...
  • 03 Feb 2009

    My latest security content

    Wow, it's been nearly a month since my last posting of security content. Lots of writing but slow publication cycles I suppose. First off, here's an article I wrote for SearchEnterpriseDesktop.com:How to strike a balance between Windows security and business needsHere's a webcast/podcast combo I presented for SearchMobileComputing.com and sponsored by Dell:Data Protection for the Mobile Workforce - webcastData Protection for the Mobile Workforce - podcastMuch more to come soon!In ...

    Continue Reading...
  • 20 Oct 2008

    Question posed to me about IT operations not being on board with security

    Here's an interesting question someone asked me recently regarding some in-fighting about security along with my brief response on how to fix the problem. I see this ALL the time!:"I work in a company as the sole information security analyst. My job is to identify risks, set policy, and audit our IT environment against the policies I wrote. I am currently working with IT operations staff on mitigating risks based ...

    Continue Reading...
  • 21 Mar 2008

    My security content from this week

    Here's my latest stuff:Metasploit 3.1 updates improve Windows penetration testing Making the Business Case for Information Security[This is an interactive issue of the magazine. You'll need to click on Current Issue, then Contents, then the Contents graphic. You'll see my article listed. Click on it to go to it.]...and a related article:The Business Case for Information Security - What businesses are up against and why it is neededFinally, a podcast:Mobile ...

    Continue Reading...