We've all been subjected to the marketing hype the IT and security product vendors put out daily...Well, if you've been looking for ways to save some money, here's why you should not buy information security products:9 good reasons not to buy information security products...the marketing madness will never cease. We just have to grow wise and understand what to buy into and what to ignore....
Continue Reading...Been wondering about the latest on mobile/backup/database/email encryption? Well, here are some recent tips I wrote to TechTarget that'll help you get the ball rolling:Securing SMB laptopsSecuring removable media with BitLocker To GoSecure your data backups with encryption key management best practicesEncryption – the great security control that nobody’s usingThe true value of transparent data encryptionIs full email encryption the solution to Exchange security?...
Continue Reading...When you look past all the ridiculous hype and craze over "cloud computing" the realities set in. Here's a new piece I wrote for SearchCompliance.com that can help set you straight:Find unexpected vulnerabilities to ensure cloud compliance...
Continue Reading...Here's some more new information security content - stuff on network administration, employee monitoring, checklist audits, and more. Enjoy!How to get - and keep - user support with security How to get management on board with Web 2.0 security issues Underlying causes of inconsistent patch management Are your IT administrators trustworthy? Monitoring user activity with network analyzersPriorities for your sound regulatory compliance management policy Go beyond a checklist audit for ...
Continue Reading...I was recently asked to write a whitepaper on considerations for Bitlocker in Windows 7. While doing my initial research I learned a lot about BitLocker and discovered some new ideas and approaches for managing sensitive data. In this whitepaper I cover:Why data encryption mattersBitLocker’s new features in Windows 7Operational concerns you need to think aboutUsability issues that can create problemsPotential compliance and security gaps you don’t want to overlook…and ...
Continue Reading...You may recall my appearance on CNN television earlier this year when a hard drive went missing from the National Archives and Records Administration. Well, apparently some lessons don't sink in. This time around the National Archives folks sent an unsecured hard drive containing personal info on 70 million+ veterans to a vendor for "repair and recycling" (huh?). Apparently an employee subverted a policy then had to go on leave ...
Continue Reading...If you can, check out today's Wall Street Journal - page A20. I talk about sensitive information being mismanaged on mobile devices. You may already know how I feel about mobile security...what's it going to take to fix this issue?...
Continue Reading...Here are a few new pieces just published. Enjoy!The lowdown on PCI complianceTesting rich Internet applications: 2009's best free toolsBig Brother or lowly minion - finding your role in ITBe sure to check out www.principlelogic.com/resources.html for all of my information security articles, podcasts, webcasts, screencasts, my Twitter updates, and more....
Continue Reading...Here's a link to a post I just made that you may be interested in:4 things you can do right now to find out if your business is at risk...
Continue Reading...Here's my latest information security content. Hope you enjoy!Big IT Lessons Small Businesses Can Learn (an IncTechnlogy.com piece I contributed to)How often should I change the passwords for my bank and other important online accounts? (a Women's Health magazine piece I contributed to)Web 2.0 application security troubleshooting, testing tutorialHIPAA-covered entities, business associates confront HITECH Act rulesTen sure-fire ways to derail your career in IT What you should know about cloud ...
Continue Reading...