Here are some recent articles I wrote for TechTarget's SearchDisasterRecovery.com and SearchCompliance.com on the relationships between DR planning and information security as well as records management and the dreaded e-discovery process. Serving as an expert witness on various information security cases, I can assure you that you'll want to be prepared for both - especially the latter:Disaster recovery security: The importance of addressing data security issues in DR plansLeaning on ...
Continue Reading...If I had to choose two things that IT and information security pros need to focus on more than anything else, it'd be learning how to manage your time and continually fine-tuning your technical skills.Well here are two pieces I wrote for SearchWinIT.com that that delve into these topics:Time management strategies for the IT proLow-cost ways to get the IT skills you need...learn these skills and practice them over and ...
Continue Reading...Here's a recent piece I wrote for my friends at SearchCompliance.com regarding the lost laptop problem and what it's costing businesses:The Billion Dollar Lost Laptop – What’s it costing your business?I've seen some naysayers out there stating that there's no way a lost laptop could match up to Ponemon's figures. I say why find out!? Whatever the cost, the solutions for laptop security are simple once the choice is made ...
Continue Reading...The new edition of a very solid and unique magazine on security (both physical and IT) - Security Technology Executive - is now online.Be sure to check out the column I wrote in this issue entitled "Fighting the Malware Fight All Over Again" on page 21....
Continue Reading...Be it smartphones or desktops, when it comes to securing Windows you've got to look at both. Here are some new pieces I wrote for SearchEnterpriseDesktop.com that you may be interested in:Security considerations for Windows Phone 7Should you use third-party patching tools to keep Windows 7 secure?Weighing Windows Firewall for enterprise desktop protection...
Continue Reading...Here are some recent webcasts/podcasts I recorded for SearchSoftwareQuality.com (@SoftwareTestTT) on Web application security:Security Lesson: Beating Web application security threatsSecurity Lesson: How to test for common security defectsI feel like I'm just scratching the surface on this topic but, thinking about what's going on out there, many people have yet to realize there's even a problem. Focus on these basics and you're going to eliminate the large majority of Web ...
Continue Reading...Joe Mullich, a writer for the @WSJ, has put together some great stories on cybercrime and data breaches in Marketplace (section B) today. My contribution is on smartphone security and it's located on page B9 at the end of the piece titled "A Surge of Smishes - Workers' laxness opens door to smartphone data theft".Also check out the piece on TigerText (the secret texting app) on page B11. Cool stuff....
Continue Reading...How often should you test your Web sites and apps for #security flaws? Well, it depends of course! Here's a new bit I wrote where I delve into the different variables and things you need to be thinking about:How often should you test your web applications?Enjoy....
Continue Reading...I was just told by my acquisitions editor at Wiley that my book Hacking For Dummies is being made available as an Italian language publication.English, Estonian (I know, who would've thought!?) and now Italian...cool....
Continue Reading...Here are a couple of #cybersecurity pieces I authored for TechTarget's SearchCompliance.com regarding the proposed Rockefeller-Snowe Cybersecurity Act of 2009 (Senate Bill 773) and Lieberman-Collins-Carper Protecting Cyberspace as a National Asset Act of 2010 (Senate Bill 3480):Why the Cybersecurity Act is better for government than businessIs the latest cybersecurity bill an Internet takeover by the fed?You know how I am about government growth and its intrusion into the free market. ...
Continue Reading...