I have some new information security content that you may be interested in. First, here's an article I wrote for SearchSQLServer.com:The fine line between not encrypting your databases and breach notification...and two articles I wrote for SearchSoftwareQuality.com:Using the Firefox Web Developer extension to find security flawsCloud computing and application security: Issues and risksEnjoy!Also, be sure to check out www.principlelogic.com/resources.html for all of my information security articles, podcasts, webcasts, screencasts and ...
Continue Reading...Thomas Bracket Reed said "One of the greatest delusions in the world is the hope that the evils in this world are to be cured by legislation".I see this belief in action over and over again with regards to security policies and all these regulations we're up against. Just because you have policies and just because someone in your organization thinks that the business is "compliant" with whatever law or ...
Continue Reading...Here's something I just came across that reminded me of the cluster$*!@ that's usually created by people trying to put together security policies. It also reminds me of the ridiculous government growth plan (you've gotta read the stuff at this link) created by Obama - our American Idol."Laws are like sausages, it is better not to see them being made." - Otto von Bismarck, 1st Chancellor of the German Empire ...
Continue Reading...Wow - Google execs being charged in Italy over a posted video. Bye-bye YouTube, etc. as we know it. I'm sure our new leaders can help these guys. Seriously...I don't know all the details but based on what I've seen this is unbelievable!...
Continue Reading...Did you know that you become what you think about the most? Here's a neat little video excerpt from Earl Nightingale's The Strangest Secret that talks about this very thing. Very inspirational.Be like the land Mr. Nightingale talks about. I use this mental visualization technique in my personal life and career. I can honestly attribute my success to it. It really works.Now I just need to apply it to my ...
Continue Reading...Ever have a situation where a crisis is going on and you witness people taking advantage of it for their own ill-gotten gains? For example, like a security breach leading to the purchase of unnecessary technical controls or implementation of draconian policies (especially when the basics haven't even been addressed). All to boost an IT manager's ego.Or look at what President Bush did: exploit 9/11 to give the government more ...
Continue Reading...Well it's our big day here in the U S of A. The Messiah has become our new leader. Let the four years of us being talked down to with "charisma" and "captivation" begin. Time for the use of the government as an instrument of plunder to grow beyond our wildest imaginations. An era where we push aside our selfish desires for individuality and all become "one".I suspect when he's ...
Continue Reading...Well, our people in Washington are up to it again. This time a plan for "free" broadband for Americans finally bridge the so-called gap between the Internet haves and have-nots. I thought we already had free Internet access in our local libraries but I guess that's not enough in our couch potato society. Oh, and censorship is already built into the plan - I can't fathom where it'll only go ...
Continue Reading...Although I disagree with Becky's push to vote, vote, vote! (too many uninformed and non-tax paying citizens already vote and shouldn't be able to), here's a good post about some recent election/voting stories involving IT and security....
Continue Reading...