• 13 Sep 2011

    Stephen Covey’s insight applies to information security

    I love the following quote...very applicable to what we do:"You can't talk yourself out of a problem you behave yourself into." - Stephen CoveyOkay, you may be able to talk your way out of bad security decisions with the right attorneys or a cybersecurity insurance policy. Having worked cases involving data breaches, compliance and intellectual property, I can say that it won't be a short-lived, inexpensive or painless ordeal....

    Continue Reading...
  • 31 Aug 2011

    Talk is cheap: Time to rethink your data retention strategy (or lack thereof)?

    Here's a fascinating story about a court case involving data retention you need to read. And pass it along to your management as well. It talks about how businesses aren't doing what they need to be doing with regard to data retention and how decisions are being made for us by the courts. Interestingly most businesses I come across (large and small) don't have any semblance of a data retention ...

    Continue Reading...
  • 11 May 2011

    The new IT skill you *must* develop

    Yesterday I had lunch with some colleagues who are lawyers that focus their work in/around compliance, intellectual property and cloud computing. It was neat to hear their perspective on where things are headed in IT. We came to the conclusion that IT professionals are going to have to learn as much as they can about the legal side of what we do.I'm not talking compliance in general but also contracts, ...

    Continue Reading...
  • 04 May 2011

    From culture to products to malware to breaches – where do you stand?

    Here are some new opinion pieces on information security management that I wrote for Security Technology Executive magazine that you may be interested in:Don’t end up on the wrong side of a data breachFighting the malware fight all over again9 good reasons not to buy information security productsSecurity best practices without question?How's your security culture?Enjoy!As always, be sure to check out www.principlelogic.com/resources.html for links to all of my information security ...

    Continue Reading...
  • 29 Apr 2011

    Nikon Image Authentication vulnerability

    The fine folks at @Elcomsoft have discovered yet another security flaw in digital cameras. First it was Canon. This time it's Nikon - specifically Nikon's Image Authentication Software.Elcomsoft researchers found that the way the secure image signing key is being handled in the camera is flawed. This allowed them to extract the original signing key and then produce manipulated images that appear to be legit. I could see this being ...

    Continue Reading...
  • 07 Mar 2011

    Disaster recovery & security plus e-discovery & records management

    Here are some recent articles I wrote for TechTarget's SearchDisasterRecovery.com and SearchCompliance.com on the relationships between DR planning and information security as well as records management and the dreaded e-discovery process. Serving as an expert witness on various information security cases, I can assure you that you'll want to be prepared for both - especially the latter:Disaster recovery security: The importance of addressing data security issues in DR plansLeaning on ...

    Continue Reading...
  • 01 Apr 2010

    Two B I G reasons to secure your home computers/network

    Here's a crazy story: burglar breaks into a home, uploads child pornography on the family computer, and tries to frame the husband of his co-worker who he had a crush on.If this isn't a good enough reason to secure your home computers, I don't know what is.Not to mention your wireless network. How'd you like one of those creeps we used to see on Dateline's To Catch a Predator doing ...

    Continue Reading...
  • 23 Feb 2010

    P2P risks, all over again

    It's sad when our government has to warn businesses about their own P2P network security flaws.I wrote about the security considerations with P2P applications seemingly a lifetime ago (2003) for TechTarget in a piece titled Are P2P applications worth the risk? Around this same time I served as a P2P expert on a panel discussion at American Intellectual Property Law Association's conference in Atlanta where we discussed these same issues.Nothing ...

    Continue Reading...