• 02 Sep 2008

    My security content from this week

    Here's a piece I wrote for SearchDataBackup.com (a new TechTarget site I'm now writing for):Change management and disaster recovery...as well my thoughts on the latest and greatest version of BackTrack (a tool you've gotta get familiar with):Free security testing toolkit review: BackTrack 3As always, be sure to check out www.principlelogic.com/resources.html for all of my information security articles, podcast interviews, webcasts, and screencasts....

    Continue Reading...
  • 20 May 2008

    Manually monitoring email? What’s up with that!?

    With all of the technical sophistication we have, apparently business people still haven't figured out a way to automate the employee monitoring function. According to a new Proofpoint/Forrester Consulting survey, 41% of organizations companies with 20,000+ employees are *employing* people to monitor outbound email. Are you serious!? We've had automated employee monitoring systems for 10+ years that anyone in HR can manage and companies are paying people to do this ...

    Continue Reading...
  • 20 Mar 2008

    Thought for the day on effecting change

    I just came across this great quote by Anthony Robbins which can apply to your security career or to your organization's overall security - really anything in life:"If you do what you've always done, you'll get what you've always gotten."Love it!...

    Continue Reading...
  • 27 Feb 2008

    RTFM

    At a recent wedding I attended a woman was clamoring about not knowing how to use her digital camera. Apparently no one had shown her how to work it. This reminded me of a basic principle we often overlook in IT and security. It's reading the fine - or freaking or whatever - manual (RTFM).Whenever you have a question or don't know how to use your latest security product, interpret ...

    Continue Reading...
  • 17 Jan 2008

    Cox Communications telecom outage highlights the need for better security processes

    This is one of those often-overlooked security operations weaknesses that ends up being one of the most vicious. A fired Cox Communications worker hacks back in and wreaks havoc: https://www.scmagazine.com/former-cox-communications-employee-pleads-guilty-to-hacking-company-network/article/553715/ Also a good reason to watch the "watchers". Funny thing that many people in IT forget: there's this thing called change management that helps quite well in these situations....

    Continue Reading...
  • 19 Dec 2007

    Firewall Best Practices

    Based on yesterday's post regarding firewall best practices, I thought it made sense to go ahead and post the 'best practices' content here as well. This is straight out of my Firewall Best Practices document I just recently updated:Firewalls are not the end all, be all solution to information security. They are, however, a necessary component of an effective network security infrastructure. The following list is a set of reasonable ...

    Continue Reading...
  • 18 Dec 2007

    Firewall change management? Who needs that anyway…

    I recently had someone contact me and ask about the change management item I list in my Firewall Best Practices document. This person's inquiry revolved around them trying to get management to adopt change management practices and the troubles associated with having to properly and realistically explain to management the risks involved of not having good practices. This person wanted to know if I could explain the risks involved when ...

    Continue Reading...