Last week I had the opportunity to attend the ISC2 Congress in Atlanta. It was held in conjunction with that physical security organization. When I arrived to walk the show floor, it was nothing but physical security vendors - as far as the eye could see. After about 45 minutes (sans program guide), I discovered where the information security vendors where. There were about five of them and they were ...
Continue Reading...The inability to think long-term, to see the bigger picture consequences of our choices, is no doubt at the root of most information security problems. Here's an example of what I'm talking about...what's wrong with this car?No, this isn't a race car with Hoosier racing slicks...it's a street car owned by someone working or shopping at a Wal-Mart who has chosen to drive with improper equipment. Like many people who ...
Continue Reading...My Delta co-passengers and I recently had the opportunity to experience a near 1-hour flight delay due to, none other than, some dude dropping his iPhone into the aft toilet on our fancy Boeing 757. I'm not making this up...Yep, there we were sitting at the gate and this guy comes up to the flight attendants to ask for some help getting his iPhone out of the crapper. Yuck! The ...
Continue Reading...I just had an epiphany in the bathroom. I know, I know...bear with me.I thought to myself, Why is it people use Lysol to cover up, um, smells and such in the bathroom?? Sure Lysol kills the problem at the source but, goodness gracious, there are other means of consideration than to merely cloud up the bathroom covering up something that probably shouldn't be there in the first place! Know ...
Continue Reading...From @Quotes4Writers on Twitter, this totally reminded me of me:"You have to be brave to take out that white sheet of paper and put on it words that could be evidence of your stupidity." - Sol Saks...
Continue Reading...I spoke at the @ISACAAtlanta GeekWeek show and all I got was this lousy notification ;-)Seriously, it was a good show that I recommend next time they have it....
Continue Reading...I recently came across a Web site I was creating an account for which stated the following for its login requirements:Your user name & password must consist of letters in all caps 4-7 characters in length.Too funny......
Continue Reading...Probably late to the game but just had to post this:During a recent password audit, it was found that a blonde was using the following password: MickeyMinniePlutoHueyLouieDeweyDonaldGoofy When asked why such a big password, she said that it had to be at least 8 characters long....
Continue Reading...This "10 worst moments in network security history" is a little light but I did enjoy slides 4, 5, 6, and 9. Check it out....
Continue Reading...Here's a great definition of the term power user for you:Pc Operators Who Eventually Run, Unload, Screw up, Erase, and Remove Software*Sound familiar!?*I can't remember who I got this from...I cut out of a presentation I attended years and years ago and it's been sitting on my desk ever since. It may have been Laura Chappell or someone else who presented at Novell's Brainshare conference back in the mid-90's. Sorry ...
Continue Reading...