Apparently our Imperial Federal Government can't even follow its own rules for information privacy and security. It was just announced that a secret list of nuclear sites was released "by accident".First of all, "accidents" are like "computer glitches" - there's almost always human error behind them. Do you see the irony here? How is heavily-regulated private industry to be expected to lock everything down when the very entity writing OUR ...
Continue Reading...CNN's Mike Ahlers and Elaine Quijano put together an intriguiging segment about a lost hard drive from the National Archives for The Situation Room with Wolf Blitzer television show I appeared on last night. The hyperlink goes to the actual article...the video hasn't been posted yet and they're telling me it may not be. I hope you had the chance to see it live last night. If it gets posted ...
Continue Reading...Here's my latest information security content - more from the queue coming soon...just waiting for it to be published.Here's a webcast I recorded for SearchCIO.com:Continuous Data Protection (CDP) Strategies for the EnterpriseHere are two whitepapers I wrote for Realtimepublishers.com on behalf of Credant:Navigate the Future of HIPAA ComplianceData Protection for the Evolving WorkforceAs always, be sure to check out www.principlelogic.com/resources.html for all of my information security articles, podcasts, webcasts, screencasts ...
Continue Reading...Here's my latest stuff....First off, here's an article I wrote for SearchEnterpriseDesktop.com:Using Sysinternals tools in security management scenarios (a follow-up to my previous Sysinternals article)...and a podcast I recorded for SearchCIO.comMobile data protection options for enterprise CIOs (transcript included!)Enjoy!Also, be sure to check out www.principlelogic.com/resources.html for all of my information security articles, podcasts, webcasts, screencasts and more....
Continue Reading...Wow, it's been nearly a month since my last posting of security content. Lots of writing but slow publication cycles I suppose. First off, here's an article I wrote for SearchEnterpriseDesktop.com:How to strike a balance between Windows security and business needsHere's a webcast/podcast combo I presented for SearchMobileComputing.com and sponsored by Dell:Data Protection for the Mobile Workforce - webcastData Protection for the Mobile Workforce - podcastMuch more to come soon!In ...
Continue Reading...Here's a webcast on IM/VoIP/P2P I just recorded for SearchWinIT.com:The Challenges and Solutions of Realtime CommunicationsHere are two articles I wrote for the latest issue of Security Technology & Design magazine:Mobile Security - Is anyone listening?Wireless Security: Does it still matter?Be sure to check out www.principlelogic.com/resources.html for all of my information security articles, podcast interviews, webcasts, screencasts and more....
Continue Reading...Here's an article I wrote for SearchEnterpriseDesktop.com:Managing single sign-on burdens in Windows...and here's a podcast I recorded for TechTarget as a whole:Top Five Issues of Mobile SecurityBe sure to check out www.principlelogic.com/resources.html for all of my information security articles, podcast interviews, webcasts, screencasts and more....
Continue Reading...Here's a prime example of just how encryption/change management/policies/whatever else mean nothing when someone makes a bad decision related to information security. Why was this sensitive information unencrypted when it was moved to a new system? Hint Mr. Contractor: all it takes to easily re-encrypt sensitive data is something as basic as Winzip. If you have to decrypt it to use it...then just re-encrypt when you're done.If you're ever caught ...
Continue Reading...Here's an information security article published this week:Security tools that can boost Windows Mobile security As always, for my past information security content be sure to check out www.principlelogic.com/resources.html.Enjoy!...
Continue Reading...Here's an interesting story I stumbled across. Didn't seem to get much coverage elsewhere. Apparently people can't even visit our own White House without getting victimized. Man....that train of thought could go in SO many directions. Anyway, the lesson is to not leave your Blackberries, smartphones, and PDAs lying around in your purse, on your desk, or any other conspicuous place where they can be taken.No worries here though, I'm ...
Continue Reading...