• 05 Jul 2025

    CIOs: You can’t afford to sit out on security (especially with AI in the mix!)

    As an information security consultant, I’ve worked with many CIOs over the years. Some get it when it comes to security… and some not so much. Those who don’t are often the ones calling me in after the fact, cleaning up breaches that could have been prevented with stronger executive engagement. I've actually seen people in this role run interference with security. I'm assuming so they weren't made to look ...

    Continue Reading...
  • 13 Jul 2018

    Introducing my brand new vulnerability and penetration testing book: Hacking For Dummies, 6th edition

    Want to learn the essentials of vulnerability and penetration testing? Looking for insight into which testing tools you need to use to get the job done right? Maybe you need help in determining the difference between the vital few security vulnerabilities and the trivial many that sidetrack so many people? Perhaps you need help selling information security to management and keeping them on board with what you're doing? Well, if ...

    Continue Reading...
  • 31 Mar 2017

    Outsourcing security monitoring, guest wireless network risks, and more infosec content to help your business

    I can't believe that I recently submitted my 1,000th article...it's been a long time coming! I first started writing in 2001 and it has been one of the best things I ever did. Thanks so much for your support over the years!Here's some new content I've written for the nice folks over at Toolbox.com (Ziff Davis) that you might be interested in:  Outsource your security monitoring/alerting and be done with ...

    Continue Reading...
  • 03 Jan 2017

    Keys to a great 2017

    Welcome to 2017! It's another year and another great opportunity to get security right in your organization. As you return to work with a cleared mind and good intentions, building (or maintaining) an effective information security program in the New Year is not unlike my favorite passion: car racing. You not only need to get off to a good start but you also need to keep up your momentum...lap after lap ...

    Continue Reading...
  • 09 Sep 2016

    How to (finally) get your information security program on track

    Here's some of my latest content...this time on running a well-oiled information security program. Enjoy!Core reasons why information security programs failHow to stick to your IT security planIt takes more than resolve to manage an effective security programThe one thing that criminal hackers have on their side that you don't Setting and achieving realistic information security program goals for 2016Waiting until the last minute to implement long-term security measuresIT turnover ...

    Continue Reading...
  • 13 Apr 2016

    Why data classification is a joke

    I just saw this post on Slashdot about 0bama saying that classified means whatever it needs to mean. It reminds me of how data classification is treated as an information risk management function in the enterprise: mostly non-existent:Data classification programs that do exist are typically a joke whereby IT and security handles everything with no involvement from the business or legal or legal handles everything with IT and security being ...

    Continue Reading...
  • 22 Feb 2016

    New independent content on information security

    Here are some articles and guest blog posts I've written for my friends at TechTarget, Ziff Davis, AlgoSec, and Rapid7: Key Network Security Questions You Need To Ask Your Cloud Vendors - Now! Everything happens for a reason in security How one bad decision brought down an enterprise e-commerce site in minutes With security, periodic and consistent is key How emerging threat intelligence tools affect network security The science behind ...

    Continue Reading...
  • 16 Jan 2016

    Tips for taking your information security program to the top

    Ready to make some changes to your information security program for 2016? You need to read these pieces I've recently written: Setting and achieving realistic information security program goals for 2016 Information security's chicken and egg problem (formerly published at toolbox.com) Security's gaping hole - policy enforcement (formerly published at toolbox.com) Four reasons people aren't buying what you're selling in IT (formerly published at toolbox.com) When security policies are bad ...

    Continue Reading...
  • 02 Dec 2015

    How effective is your security program? New content and, perhaps, some new ideas.

    Slow going on the posts lately - too busy writing for other websites! :-) So, here's some of my latest for you - this time on the subject of information security management and running an effective security program:Information security is not stagnant but dynamicThe mishandling sensitive data: Do you really know what you don’t know?Security Decision-Making: When Decisions Are Based on Fear Rather Than FactState of the Network study: How ...

    Continue Reading...
  • 08 Jun 2015

    My latest information security content: truly *managing* your security program

    Check out the following information security management pieces I've written for Ziff Davis and IBM recently: If there’s a will with information security there will be a way  Eight remarkable things you’re doing with security that you can make even betterDivulging sensitive info for a potential acquisition - good idea or bad?Formidable Threats and Minimal Visibility - A Troublesome CombinationWhen vendor security vulnerabilities become your own Additional information security content ...

    Continue Reading...