One bite at a time, of course. Don't ever forget this when it comes to tackling big information security projects, writing your first article, putting together an important presentation, going down the path of writing a book - whatever. The day-to-day "little" stuff seems boring and unimportant but it's not. Here's a good quote that sums it up:"You have to put in many, many, many tiny efforts that nobody sees ...
Continue Reading...Here's my latest stuff:Metasploit 3.1 updates improve Windows penetration testing Making the Business Case for Information Security[This is an interactive issue of the magazine. You'll need to click on Current Issue, then Contents, then the Contents graphic. You'll see my article listed. Click on it to go to it.]...and a related article:The Business Case for Information Security - What businesses are up against and why it is neededFinally, a podcast:Mobile ...
Continue Reading...Here's a great quote I was reminded of that made me chuckle thinking about how information security controls often result in the same outcome...From the business master himself:"Most of what we call management consists of making it difficult for people to get their work done." -- Peter Drucker...
Continue Reading...Over the Christmas holidays I noticed an interesting retailer procedure that strikes home with us in information security. It's manager overrides...You know when you buy something special or need to return something that requires manager approval...The cashier has to call over a manager to override what s/he is trying to do. I certainly understand the need for an override. Maybe the purchase is over $500 or there's no receipt for ...
Continue Reading...Based on yesterday's post regarding firewall best practices, I thought it made sense to go ahead and post the 'best practices' content here as well. This is straight out of my Firewall Best Practices document I just recently updated:Firewalls are not the end all, be all solution to information security. They are, however, a necessary component of an effective network security infrastructure. The following list is a set of reasonable ...
Continue Reading...As the saying goes, the more things change they more they stay the same. It suits what's happening with security just perfectly. It's common knowledge that computer security is a problem that affects every business and every individual in some way. Security best practices are available. The rules have been laid down. Why are breaches still occurring?I think to myself, on the surface there's:information systems complexityuntrained IT staffpeople not using ...
Continue Reading...