• 18 Jul 2014

    How to communicate Web security to management, must-have security testing tools, and compliance in the cloud

    Check out these new pieces I've written and recorded on Web application and cloud security. If you follow the things I recommend on communication (first three links), you can absolutely transform your information security program and the way that people perceive you as an IT professional.Communicating with Management about Web Security, Part 1 - Knowing What You're Up AgainstCommunicating with Management about Web Security, Part 2 - Prioritization and Sending ...

    Continue Reading...
  • 11 Jan 2011

    Tidbits on MS security, MBSA vs. the competition & cloud backups

    Here are a few new articles I wrote for TechTarget where I talk about IIS 7.5 security, encrypting Windows Server drives, MBSA vs. commercial vulnerability scanners and the dearly beloved cloud backup services. Enjoy!How vulnerable is Microsoft IIS 7.5 to attacks?Pros and cons of Windows Server drive encryptionWeighing MBSA against paid vulnerability scannersPreventing online backup security threats to your network...

    Continue Reading...
  • 14 Oct 2009

    The fastest vendor acquisition I’ve seen

    This has to be the fastest security startup/acquisition I've ever seen. I'm pretty sure the company - which is here in my neck of the woods - was less than a year old.You know how I feel about SaaS and "the cloud" but kudos to Paul Judge, Chris Tilton, and those guys for growing and turning this thing around so quickly. Capitalism at its finest!!...

    Continue Reading...
  • 04 Jun 2009

    My new security vulnerability scanning service

    Well, I'm officially on the SaaS market. I've just launched my security vulnerability scanning service for both basic external security scans as well as the PCI Council's mandated Authorized Scanning Vendor (ASV) scans.Here's what I just posted on my Web site:Whether you need to minimize your investment in information security and compliance, you’re in need of an easy way to discover the low-hanging vulnerabilities, or you need help certifying your ...

    Continue Reading...