• 17 Apr 2010

    Essentials for cracking SQL Server passwords

    Looking to check the resiliency of your Microsoft SQL Server systems? You may very well find that you don't have to look much further than weak/blank passwords to gain full access. I've come across a few vulnerable SQL Server systems via manual analysis. However, I couldn't live without a small set of SQL Server password cracking tools that you should check out as well.Here's a piece I wrote that can ...

    Continue Reading...
  • 15 Apr 2010

    Using POST vs. GET

    Here's a piece I wrote recently for SearchSoftwareQuality.com:Why use POST vs. GET to keep applications secureSure, it's not cut and dried but use the wrong one when you could've used the other, the resulting vulnerabilities can get ugly....

    Continue Reading...
  • 15 Apr 2010

    Job hunting? How you can stand out & kick your competitors’ butts

    Looking for a job in IT or infosec? Here's what you need to do:Getting hired in IT: How to stand out...

    Continue Reading...
  • 22 Mar 2010

    Are you destroying your backup media the right way?

    Here's a recent podcast I recorded on backup media data destruction...better be sure you're doing it the right way:Ensuring proper data deletion or destruction of backup media...

    Continue Reading...
  • 22 Mar 2010

    Email security – using content filtering and incident response to round things out

    Here are some recent bits I wrote for SearchWinIT.com and SearchExchange.com to help you flesh out the security of your email environment:The state of email content filtering - and what you can doSolidify your Exchange email server incident response plan...

    Continue Reading...
  • 19 Mar 2010

    All the reasons you need to NOT buy security products

    We've all been subjected to the marketing hype the IT and security product vendors put out daily...Well, if you've been looking for ways to save some money, here's why you should not buy information security products:9 good reasons not to buy information security products...the marketing madness will never cease. We just have to grow wise and understand what to buy into and what to ignore....

    Continue Reading...
  • 19 Mar 2010

    New tips on 4 facets of encryption

    Been wondering about the latest on mobile/backup/database/email encryption? Well, here are some recent tips I wrote to TechTarget that'll help you get the ball rolling:Securing SMB laptopsSecuring removable media with BitLocker To GoSecure your data backups with encryption key management best practicesEncryption – the great security control that nobody’s usingThe true value of transparent data encryptionIs full email encryption the solution to Exchange security?...

    Continue Reading...
  • 11 Mar 2010

    Unexpected vulnerabilities in the cloud?

    When you look past all the ridiculous hype and craze over "cloud computing" the realities set in. Here's a new piece I wrote for SearchCompliance.com that can help set you straight:Find unexpected vulnerabilities to ensure cloud compliance...

    Continue Reading...
  • 22 Jan 2010

    My latest information security content

    Here are my latest information security articles and a podcast focusing on Web security and document security. Enjoy!First, my Web security articles:Changes coming to the OWASP Top 10 in 2010 (read the comments too, I stirred the puddin' with this piece!)Free Web proxy tools you need to get to knowSecuring Web servers in Windows environments...and a document security podcast (this is a really interesting story if you haven't heard about ...

    Continue Reading...
  • 11 Jan 2010

    Introducing my new book – Hacking For Dummies, 3rd edition

    Well, after months of edits, additions, and subtractions my new piece of work has finally arrived: Hacking For Dummies, 3rd edition I just received my copies last week and it should be in bookstores any time - if it's not already. Hacking For Dummies, 3rd edition is also available on Amazon.com (at a 34% discount to boot!).So, how is this 3rd edition different or better from the previous editions? In ...

    Continue Reading...