• 28 Apr 2011

    The mobile device free-for-all dilemma

    From @ECIOForum, can you envision enterprises giving workers any desktop or mobile device they want to do their jobs?I think an important follow-up question is: does it really matter?People are going to do what they're going to do. Those of us in IT and infosec can scream No, No, No this or that mobile devices on the network at the top of our lungs; until eternity...But you know what? People ...

    Continue Reading...
  • 06 Dec 2010

    Unbelievable #s in the new Billion Dollar Lost Laptop Study

    I spent last Thursday in San Francisco at a press briefing held by Intel's Anti-Theft Technology group regarding the new Ponemon Institute Billion Dollar Lost Laptop Study. Larry Ponemon's study found that businesses are losing billions of dollars through lost and stolen laptops - something I wrote about three years ago...and a problem that's been around even longer.Malcolm Harkins (Intel's CISO), Anand Pashupathy (GM of Intel's Anti-Theft Services), Larry Ponemon ...

    Continue Reading...
  • 23 Nov 2010

    Windows and Linux management tips and tricks

    From Windows to Linux - desktops to mobile devices - here are some recent pieces I've written for TechTarget that you may be interested in:Devise a Windows XP end-of-life strategy before migrating to Windows 7Troubleshooting Windows 7 with built-in tools and online resourcesSecuring the new desktop: enterprise mobile devicesCommon Linux Security policy management gaps...

    Continue Reading...
  • 06 Oct 2010

    911, what’s your emergency?

    There's a saying when seconds count the police are only minutes away. Maybe yes, maybe no - and like I just experienced, sometimes they may not care at all. Let me explain...Have you ever been driving down the road and witnessed someone driving completely erratically to the point where you think "WOW, that person is going to cause a wreck, soon." Well, I was out for a leisurely drive in ...

    Continue Reading...
  • 09 Jul 2010

    The reactive nature of policies that people ignore

    I got stuck in a traffic jam while passing through the famous and lovely town of Kennesaw, GA yesterday because of this unattentive truck driver trying to cross a raised railroad crossing:I wonder what part of the No Trucks sign he didn't understand. There's another sign out of the frame that warns truckers of a $1,000 fine if they cross there. Ouch!This situation can be compared to the disconnected and ...

    Continue Reading...
  • 16 Jun 2010

    Should Windows users have full admin rights?

    Here's a piece I wrote recently for SearchWinIT.com where I cover the never-ending debate about whether or not users should have administrative rights on their computers:Should Windows users have full administrative rights?If you have additional insight, please let me/us know. It's something every business can benefit from....

    Continue Reading...
  • 02 Feb 2010

    What part of No Truck Crossing do you not understand?

    Check out this wild video of a train crash yesterday. It's a great example of the fact that just because you have a policy (i.e. the no truck crossing sign) doesn't mean that people will abide by (i.e. the dummy driver who probably thought "Aw, I can make this."). Some people just believe that they are exempt from certain things.Keep this in mind for your information security matters...you can't save ...

    Continue Reading...
  • 07 Jul 2009

    My latest security content

    I'm taking this week off but I've scheduled this post of three new articles I've written that you may be interested in:Networking to enhance your IT careerA compliance officer, secure network aren't enough for real complianceData retention policies and procedures for SMBsAs always, be sure to check out www.principlelogic.com/resources.html for all of my information security articles, podcasts, webcasts, screencasts and more....

    Continue Reading...
  • 25 May 2009

    My latest security content

    Here's my latest information security content you may be interested in:How to forge an IT consulting careerHow to maintain IT shop efficiency when you're the last man standingDesktop security preparation for a new wave of Windows appsAs always, be sure to check out www.principlelogic.com/resources.html for all of my information security articles, podcasts, webcasts, screencasts and more....

    Continue Reading...
  • 26 Mar 2009

    So, policies are important?

    I had the privilege and pleasure of having lunch with security maven - and policy king - Charles Cresson Wood last week while he was in town speaking at a show. Here's a good read I just came across on some more of his thoughts regarding what many think of as a drab subject that doesn't really matter in the grand scheme of things. It'll get you thinking...Maybe time for ...

    Continue Reading...