• 07 Mar 2013

    Got Compliance? Here’s my way of reducing your pain just a bit.

    It's been a while and the content is stacking up, so here's the first of many upcoming posts on new content I've written. This time up, it's a set of tips I've written for Ben Cole at SearchCompliance.com about that dreaded subject...you guessed it....compliance.Enjoy!Considering a career in compliance? Heed these warnings firstAudits, maintenance crucial to business continuity policy successControl, visibility essential to records management and complianceBeware the perils of organization-wide ...

    Continue Reading...
  • 08 Jun 2011

    Weiner fallout: “I got hacked” is the new scapegoat

    I recently met up with some technology lawyer colleagues after work and we shared our thoughts on the Anthony Weiner "incident". We were talking about how early on in the saga no one but Weiner and the lucky recipients of his tweets really knew what the truth was. Predictably, as we're seeing and hearing more and more these days, Weiner came out and said "I was hacked. It happens to ...

    Continue Reading...
  • 07 Mar 2011

    Disaster recovery & security plus e-discovery & records management

    Here are some recent articles I wrote for TechTarget's SearchDisasterRecovery.com and SearchCompliance.com on the relationships between DR planning and information security as well as records management and the dreaded e-discovery process. Serving as an expert witness on various information security cases, I can assure you that you'll want to be prepared for both - especially the latter:Disaster recovery security: The importance of addressing data security issues in DR plansLeaning on ...

    Continue Reading...
  • 19 Jan 2011

    Good bits to share about computer disposal

    Here's a good short read from SANS (@sansinstitute) you can share with your non-technical family members, friends & neighbors on why they need to careful when disposing of their computers and how they can do it properly....

    Continue Reading...
  • 20 Dec 2010

    Tips and tricks on e-discovery, forensics, and managing esi

    Here are a few pieces I wrote and recorded for SearchCompliance.com on managing all that electronic data on your network that you're constantly drowning in...Leaning on records management can take the angst out of e-discoveryWhy you need to create an ESI strategy (webcast)Why you need to create an ESI strategy (podcast)What is computer forensics technology? Does it help compliance?...

    Continue Reading...
  • 22 Jul 2009

    My latest security content

    Here's my latest information security content you may be interested in:E-discover the gaps in your information management processWeb security problems: Five ways to stop login weaknessesFixing four Web 2.0 input validation security mistakesSpotting rich Internet application security flaws with WebGoatCommon causes of Windows server security vulnerabilitiesManaging multiple passwords in WindowsAs always, be sure to check out www.principlelogic.com/resources.html for all of my information security articles, podcasts, webcasts, screencasts, my Twitter updates, ...

    Continue Reading...
  • 29 Jan 2009

    Pros and cons of information hiding

    I just read this good article on steganography and started thinking about the potential uses and misuses of this technology.So, do you have a need to hide information on mobile systems/devices to keep prying eyes away in the event of theft or loss? Sounds like a good application for it. Although given the current state of mobile security [mostly nada] I can't imagine too many people would go this far ...

    Continue Reading...