• 09 Aug 2011

    Steve Jobs’ ridiculous iTunes interface

    I just spent 6.5 minutes cracking a family member's laptop password in order to demonstrate the dangers of not having whole disk encryption. I then went on to spend 20 minutes+ of my life trying to sync some new music to an iPod Touch with the unbelievably difficult iTunes interface.... After investing a lot of time (that I'll never get back, mind you) I still didn't get the music synced. ...

    Continue Reading...
  • 12 Jul 2011

    How smartphones can make us look dumb

    Not long ago I heard a gentleman speaking with radio show host Clark Howard about a phone he purchased online. He said it had all sorts of personal information belonging to the previous owner including her healthcare records. Ouch.If I understood the caller correctly it sounded like this personal information was sent to the previous owner by her doctor. A doctor who I'm sure is HIPAA compliant...after all, as most ...

    Continue Reading...
  • 20 Jun 2011

    I’m a speaker at the Gartner Infosec show this week

    For those of you who happen to be attending the Gartner Security and Risk Management Summit in DC this week, I'd love it if you could check out my session or at least stop by to say hello. I'll be serving as a panelist on mobile security at the following session:Protect Your Identity, Mobile PC and DataSession Code SPS13 - Potomac Ballroom 19:30-10:30amCheers!...

    Continue Reading...
  • 13 May 2011

    Need secure email? Look at what bin Laden did.

    Here's a good read on the lengths Osama bin Laden when to in order to keep his electronic communications under wraps. I won't spoil the details but it's a pretty old school approach. Check it out and imagine being in one of the coffee shops where the emails were being sent out...I wonder if his thumb drives were encrypted?? Like many, I doubt they thought that one through. :-)...

    Continue Reading...
  • 28 Apr 2011

    The mobile device free-for-all dilemma

    From @ECIOForum, can you envision enterprises giving workers any desktop or mobile device they want to do their jobs?I think an important follow-up question is: does it really matter?People are going to do what they're going to do. Those of us in IT and infosec can scream No, No, No this or that mobile devices on the network at the top of our lungs; until eternity...But you know what? People ...

    Continue Reading...
  • 24 Apr 2011

    Tidbits on enterprise mobile security

    Here are some recent pieces I wrote for SearchEnterpriseDesktop.com on the subject of mobile security that you may be interested in:Securing the new desktop: enterprise mobile devicesSecurity tools that can boost Windows Mobile and Windows Phone 7 securityWhole disk encryption gotchas to look out forEnjoy!As always, be sure to check out www.principlelogic.com/resources.html for all of my information security articles, whitepapers, podcasts, webcasts and more....

    Continue Reading...
  • 19 Apr 2011

    Coffee shop laptop thefts in Atlanta a good reminder

    Here's a good reason why you need to remind your employees of the risks of using laptops in coffee shops and other public places. Once the thief has it, it's all over...unless of course a brave (stupid?) coffee shop employee comes to your rescue.A good rule of thumb is if you're setting up shop for a while then use a laptop lock to secure the system to the table. Most ...

    Continue Reading...
  • 02 Mar 2011

    The real numbers behind lost laptops

    Here's a recent piece I wrote for my friends at SearchCompliance.com regarding the lost laptop problem and what it's costing businesses:The Billion Dollar Lost Laptop – What’s it costing your business?I've seen some naysayers out there stating that there's no way a lost laptop could match up to Ponemon's figures. I say why find out!? Whatever the cost, the solutions for laptop security are simple once the choice is made ...

    Continue Reading...
  • 04 Feb 2011

    I’m quoted in today’s Wall Street Journal, p. B9

    Joe Mullich, a writer for the @WSJ, has put together some great stories on cybercrime and data breaches in Marketplace (section B) today. My contribution is on smartphone security and it's located on page B9 at the end of the piece titled "A Surge of Smishes - Workers' laxness opens door to smartphone data theft".Also check out the piece on TigerText (the secret texting app) on page B11. Cool stuff....

    Continue Reading...
  • 03 Feb 2011

    Check out tomorrow’s Wall Street Journal @wsj

    I'm being featured in a piece on #smartphones and mobile security in tomorrow's Wall Street Journal. More to come soon......

    Continue Reading...