• 03 Jun 2009

    Secret list of nuclear sites released “by accident”

    Apparently our Imperial Federal Government can't even follow its own rules for information privacy and security. It was just announced that a secret list of nuclear sites was released "by accident".First of all, "accidents" are like "computer glitches" - there's almost always human error behind them. Do you see the irony here? How is heavily-regulated private industry to be expected to lock everything down when the very entity writing OUR ...

    Continue Reading...
  • 21 May 2009

    My CNN TV appearance – yet another mobile drive debacle

    CNN's Mike Ahlers and Elaine Quijano put together an intriguiging segment about a lost hard drive from the National Archives for The Situation Room with Wolf Blitzer television show I appeared on last night. The hyperlink goes to the actual article...the video hasn't been posted yet and they're telling me it may not be. I hope you had the chance to see it live last night. If it gets posted ...

    Continue Reading...
  • 11 May 2009

    My latest security content

    Here's my latest information security content - more from the queue coming soon...just waiting for it to be published.Here's a webcast I recorded for SearchCIO.com:Continuous Data Protection (CDP) Strategies for the EnterpriseHere are two whitepapers I wrote for Realtimepublishers.com on behalf of Credant:Navigate the Future of HIPAA ComplianceData Protection for the Evolving WorkforceAs always, be sure to check out www.principlelogic.com/resources.html for all of my information security articles, podcasts, webcasts, screencasts ...

    Continue Reading...
  • 26 Feb 2009

    My latest security content

    Here's my latest stuff....First off, here's an article I wrote for SearchEnterpriseDesktop.com:Using Sysinternals tools in security management scenarios (a follow-up to my previous Sysinternals article)...and a podcast I recorded for SearchCIO.comMobile data protection options for enterprise CIOs (transcript included!)Enjoy!Also, be sure to check out www.principlelogic.com/resources.html for all of my information security articles, podcasts, webcasts, screencasts and more....

    Continue Reading...
  • 03 Feb 2009

    My latest security content

    Wow, it's been nearly a month since my last posting of security content. Lots of writing but slow publication cycles I suppose. First off, here's an article I wrote for SearchEnterpriseDesktop.com:How to strike a balance between Windows security and business needsHere's a webcast/podcast combo I presented for SearchMobileComputing.com and sponsored by Dell:Data Protection for the Mobile Workforce - webcastData Protection for the Mobile Workforce - podcastMuch more to come soon!In ...

    Continue Reading...
  • 18 Dec 2008

    My latest security content

    Here's a webcast on IM/VoIP/P2P I just recorded for SearchWinIT.com:The Challenges and Solutions of Realtime CommunicationsHere are two articles I wrote for the latest issue of Security Technology & Design magazine:Mobile Security - Is anyone listening?Wireless Security: Does it still matter?Be sure to check out www.principlelogic.com/resources.html for all of my information security articles, podcast interviews, webcasts, screencasts and more....

    Continue Reading...
  • 14 Nov 2008

    My latest security content

    Here's an article I wrote for SearchEnterpriseDesktop.com:Managing single sign-on burdens in Windows...and here's a podcast I recorded for TechTarget as a whole:Top Five Issues of Mobile SecurityBe sure to check out www.principlelogic.com/resources.html for all of my information security articles, podcast interviews, webcasts, screencasts and more....

    Continue Reading...
  • 05 Jun 2008

    When handling sensitive encrypted data – don’t just unencrypt it

    Here's a prime example of just how encryption/change management/policies/whatever else mean nothing when someone makes a bad decision related to information security. Why was this sensitive information unencrypted when it was moved to a new system? Hint Mr. Contractor: all it takes to easily re-encrypt sensitive data is something as basic as Winzip. If you have to decrypt it to use it...then just re-encrypt when you're done.If you're ever caught ...

    Continue Reading...
  • 16 May 2008

    My security content from this week

    Here's an information security article published this week:Security tools that can boost Windows Mobile security As always, for my past information security content be sure to check out www.principlelogic.com/resources.html.Enjoy!...

    Continue Reading...
  • 09 May 2008

    Why you need to protect your Blackberries – even in ‘secure’ locations

    Here's an interesting story I stumbled across. Didn't seem to get much coverage elsewhere. Apparently people can't even visit our own White House without getting victimized. Man....that train of thought could go in SO many directions. Anyway, the lesson is to not leave your Blackberries, smartphones, and PDAs lying around in your purse, on your desk, or any other conspicuous place where they can be taken.No worries here though, I'm ...

    Continue Reading...