• 20 Dec 2010

    Tips and tricks on e-discovery, forensics, and managing esi

    Here are a few pieces I wrote and recorded for SearchCompliance.com on managing all that electronic data on your network that you're constantly drowning in...Leaning on records management can take the angst out of e-discoveryWhy you need to create an ESI strategy (webcast)Why you need to create an ESI strategy (podcast)What is computer forensics technology? Does it help compliance?...

    Continue Reading...
  • 19 Dec 2010

    MS Exchange security + hacking and hardening SQL Server

    Here are some new articles I've written for TechTarget that you may be interested in:Nine Exchange server risks you don’t want to overlookTen hacker tricks to exploit SQL Server systems (and oldie that I recently updated)Do you need to harden SQL Server 2008 R2?Enjoy!...

    Continue Reading...
  • 23 Nov 2010

    Windows and Linux management tips and tricks

    From Windows to Linux - desktops to mobile devices - here are some recent pieces I've written for TechTarget that you may be interested in:Devise a Windows XP end-of-life strategy before migrating to Windows 7Troubleshooting Windows 7 with built-in tools and online resourcesSecuring the new desktop: enterprise mobile devicesCommon Linux Security policy management gaps...

    Continue Reading...
  • 16 Nov 2010

    Becoming a more refined Web security expert

    Here are some recent pieces I've written on Web application security and testing that you may be interested in. From getting started in your career to cloud security to doing Web application security testing the right way...check 'em out:The secrets to getting started in your software testing careerFour skills that will make you a better web security professionalBuilding solid security requirements Security oversights in the cloud: Asking the tough questionsWhy ...

    Continue Reading...
  • 09 Nov 2010

    Some things you need to know about Windows Firewall & Microsoft Security Essentials

    Here are a couple more pieces I wrote for SearchEnterpriseDesktop.com where I ponder the utility of Windows Firewall as well as a few things you may not have thought about regarding Microsoft Security Essentials:Weighing Windows Firewall for enterprise desktop protectionMicrosoft Security Essentials may protect non-enterprise users in your businessMicrosoft Security Essentials – when it may not be a good fit...

    Continue Reading...
  • 09 Nov 2010

    My (belated) thoughts on Intel’s purchase of McAfee

    I've been so busy working that I've failed to post some timely pieces I wrote over the summer...here's one of them:Intel's McAfee buy marks a turning point for securityI truly believe we cannot even fathom how this acquisition will impact us long term....

    Continue Reading...
  • 09 Nov 2010

    Windows 7 security tools & password weaknesses

    Here are some recent SearchEnterpriseDesktop.com pieces I wrote regarding Windows 7 security...enjoy!Using Windows 7's built-in features to keep your desktops secureWindows 7 doesn’t end the need to monitor passwords...

    Continue Reading...
  • 29 Oct 2010

    The business side of Web security (you can’t afford to ignore)

    Here's a new piece I wrote about the *other* aspects of Web security beyond the bits and bytes...Don't let this stuff catch you off guard.Preventing phishing attacks is not just a technical issue...

    Continue Reading...
  • 28 Sep 2010

    Cybersecurity Act of 2009 – It’s great for government growth!

    You may already know how I feel about our out of control government. Well here's a new piece I wrote about the Cybersecurity Act of 2009 - legislation that'll make your head spin.Why the Cybersecurity Act is better for government than businessIn subsequent edits to this article I had added some material on the new Lieberman-Carper-Collins legislation Protecting Cyberspace as a National Asset Act of 2010 (a.k.a. Senate Bill 3480) ...

    Continue Reading...
  • 28 Sep 2010

    New Windows identity & access management resources

    Here are some new pieces I wrote for SearchWindowsServer.com on Windows IAM - pros, cons, and considerations:Are identity and access management payoffs worth the fuss?The compliance benefits of Windows identity and access managementSix ways to improve identity and access management (IAM) for WindowsFinding the value in Microsoft Forefront Identity Manager 2010Enjoy!...

    Continue Reading...