• 30 Apr 2021

    Networked IP cameras as vulnerable as ever…no excuses these days.

    You've likely heard the news about security cameras being vulnerable to exploits like what was covered in this piece: https://threatpost.com/breach-verkada-security-camera-tesla-cloudflare/164635/ I feel like I'm always talking in circles when it comes to security...stop repeating history, focus on the basics, do what you know needs to be done...It's especially true for vulnerabilities in network security cameras. A little over nine years ago I wrote about this problem with cameras that I ...

    Continue Reading...
  • 21 Mar 2016

    Network complexity + intrusions = you’re not on top of things as much as you think.

    Here are some new articles and guest blog posts that I've written on the subject of network complexity, intrusions, and how most people have a false sense of security. Enjoy!Dealing with today’s information systems complexityNetwork complexity: Bad for Business, Great for Job SecurityKnowing the warning signs of network intrusionsDuring and after a breach, all eyes are on youFive network security lessons learned from the Sony Pictures hackA perspective on the ...

    Continue Reading...
  • 02 Dec 2015

    How effective is your security program? New content and, perhaps, some new ideas.

    Slow going on the posts lately - too busy writing for other websites! :-) So, here's some of my latest for you - this time on the subject of information security management and running an effective security program:Information security is not stagnant but dynamicThe mishandling sensitive data: Do you really know what you don’t know?Security Decision-Making: When Decisions Are Based on Fear Rather Than FactState of the Network study: How ...

    Continue Reading...
  • 16 Sep 2015

    My new content: Regulating security pros, network security, and locking down Windows

    Here are some recent pieces I've written on information security that you might be interested in:Why regulating information security professionals is a bad thingYour network versus the cloud – what’s more secure?Solving major security infrastructure issues around interoperabilitySoftware-defined security: The future of network security?The biggest obstacle to securing Windows Server 2012Hidden vulnerabilities on your IIS 8 serversTighten Windows 8.1 security in five simple steps As always, my other information security ...

    Continue Reading...
  • 22 Mar 2012

    Don’t underestimate the value of firewall rulebase analysis

    Are firewalls sexy? No...but you must understand that they're an integral part of your overall information risk equation. From configuration flaws to rulebase anomalies to overall system inefficiencies, your firewall rulebases can make or break security, business continuity and other critical parts of your IT operations.Last week, AlgoSec's Nimmy Reichenberg and I recorded a webinar titled How to Automate Firewall Operations, Simplify Compliance Audits and Reduce Risk that you may ...

    Continue Reading...
  • 24 Feb 2012

    CDW-TechTarget seminars are back this year – join me in Atlanta soon

    Great news - I'll be speaking at the CDW-TechTarget roadshows again this year! Our first show kicks off in Atlanta on March 13th and then we start zig-zagging across the country every few weeks until late September. For most of the shows I'll be giving two presentations:Adapting Your Old-School Network Security Agenda to Today's New-School Security Challenges ...and:Ensuring Security Controls in an Anytime, Anywhere Access EnvironmentThere will also be vendor ...

    Continue Reading...
  • 11 Oct 2011

    What can you really say about your network?

    Here's a new guest blog post I wrote for AlgoSec (a Roswell, Georgia-based company with some really solid firewall management applications) where I talk about something near and dear to all of us in IT:Do you really understand your network?...it's more than just a sappy relationship. :-)By the way, in case you missed it, I wrote a whitepaper for AlgoSec recently that you may be interested in as well:Firewall Management: ...

    Continue Reading...
  • 26 Sep 2011

    Common firewall management challenges whitepaper

    Here's a new whitepaper I recently wrote on the ins and outs - and dos and don'ts - of managing enterprise firewalls:Firewall Management: 5 Challenges Every Company Must AddressIn the paper I cover things such as rules and regulations impacting firewall management, assessing firewall policy risks, managing changes and being able to prove where things stand with your firewalls at any given point in time.Enjoy!...

    Continue Reading...
  • 14 Sep 2011

    NetIQ’s file integrity monitoring solution

    A couple of weeks ago, I had the privilege of speaking at the Information Week / Dark Reading Virtual Trade Show How Security Breaches Happen and What Your Organization Can Do About It.In my presentation How to Win the War Against Cybercrime, I apparently had a brain-cramp moment and said that I'm not seeing anybody with good file integrity monitoring. Um, duh, Kevin (as I smack myself in the face), ...

    Continue Reading...
  • 10 Aug 2011

    My webcast/Q&A today on managing network threats

    Join me today in TechTarget's SearchCompliance.com virtual tradeshow: Enterprise Risk Management: Mitigation Strategies for Today's Global Enterprise My presentation "Managing Network Security Threats with an ERM Strategy" starts around 3pm ET and I'll be doing a live Q&A just after....

    Continue Reading...