• 12 Aug 2010

    Apple’s iPad – a forensic investigation in the making?

    Here's a new piece I wrote for SearchCompliance.com on regarding the realities and risks of iPads in the enterprise.Enterprise iPads: Compliance risk or productivity tool?Simply put, they're not all that different that other mobile computing devices but they do bring something unique to the table...Speaking of "i" devices in the enterprise, here's a great read I saw recently in Information Week that outlines a scenario that's at the root of ...

    Continue Reading...
  • 01 Apr 2010

    Two B I G reasons to secure your home computers/network

    Here's a crazy story: burglar breaks into a home, uploads child pornography on the family computer, and tries to frame the husband of his co-worker who he had a crush on.If this isn't a good enough reason to secure your home computers, I don't know what is.Not to mention your wireless network. How'd you like one of those creeps we used to see on Dateline's To Catch a Predator doing ...

    Continue Reading...
  • 31 Mar 2008

    Great networking, security, and forensics resource

    Speaking of Laura Chappell, if you're not familiar with her work, I recommend you check it out. As far as I'm concerned, she's the original networking guru/goddess/queen. She knows a lot about a lot when it comes to networking protocols, security, and forensics....If you've never been to one of her sessions or classes, you haven't lived (or learned) all you can about this field. Laura's got some great material - ...

    Continue Reading...