Here's an information security article published this week:Integrating source code analysis into your database security measures As always, for my past information security content be sure to check out www.principlelogic.com/resources.html.Enjoy!...
Continue Reading...Here are two information security podcasts published this past week:Using the Malicious Mindset in Security AssessmentsNew service packs for Windows Vista and XPAs always, for my past information security content be sure to check out www.principlelogic.com/resources.html.Enjoy!...
Continue Reading...Here are my information security articles published this week:Vista SP1 vs. XP SP3 -- upgrade or business as usual?SQL Server 2008 security and compliance features reduce security risksAs always, for my past information security content be sure to check out www.principlelogic.com/resources.html.Enjoy!...
Continue Reading...Here are my articles and a podcast published this past week:Getting started with web application misuse casesFree security testing tools for Windows handheld devicesIns and outs of password securityAs always, for my past information security content be sure to check out www.principlelogic.com/resources.html.Enjoy!...
Continue Reading...Here's my one article from this week....shifting gears to Windows Mobile smart phones/handhelds:Windows Mobile OS security: Get it locked downFor all of my past information security content be sure to check out www.principlelogic.com/resources.html.Enjoy!...
Continue Reading...Just one article published this week:The Essentials of Web Application Threat ModelingFor all of my past information security content be sure to check out www.principlelogic.com/resources.html.Enjoy!...
Continue Reading...Here's my latest stuff:Metasploit 3.1 updates improve Windows penetration testing Making the Business Case for Information Security[This is an interactive issue of the magazine. You'll need to click on Current Issue, then Contents, then the Contents graphic. You'll see my article listed. Click on it to go to it.]...and a related article:The Business Case for Information Security - What businesses are up against and why it is neededFinally, a podcast:Mobile ...
Continue Reading...Here's a webcast I recorded recently for SearchWindowsSecurity.com:Vulnerability Testing Blunders, Oversights, and Common Mistakes You Must Avoid...and a podcast interview with Mike Rothman:Hacker-Proof Your ApplicationsFor all of my past information security content be sure to check out www.principlelogic.com/resources.html....
Continue Reading...Here's a videocast I recorded recently for SearchWindowsSecurity.com:Securing Endpoints the Right Way...and be sure to check out the details of my first official audio program called Getting Started in Security.For all of my past information security tips and tricks be sure to check out www.principlelogic.com/resources.html....
Continue Reading...Well, it's finally here...My Getting Started in Security audio program is now available for purchase! This audio program (which comes packaged in a 50 minute MP3 file) addresses all the right stuff you need to know to kick off your career in information security. I share with you my practical, helpful, and proven ideas that will help you make better decisions to set yourself up for success in your career ...
Continue Reading...