I had the opportunity and pleasure to do the technical editing on this book by my friend and colleague Becky Herold:The Shortcut Guide to Understanding Data Protection from Four Critical PerspectivesThis book is hands-down one of the best books out there on information security and why it matters to the business. Becky doesn't simply regurgitate the same old stuff either (not that I would expect her to). She has many ...
Continue Reading...You've heard me rant about common management and developer views of Web security here and in the articles I write for TechTarget. Here's some third-party validation of my thoughts. Entertaining yet sad....
Continue Reading...With all the worry about budgets and all the marketing hype over some of these fancy vendor security solutions, I still see so many simple/silly/stupid things related to IT that need to be fixed before a penny is ever spent or a single new technology is ever deployed. Things like: --Network shares sharing out entire drives full of sensitive files - accessible by anyone with just a basic network login ...
Continue Reading...Well, I'm officially on the SaaS market. I've just launched my security vulnerability scanning service for both basic external security scans as well as the PCI Council's mandated Authorized Scanning Vendor (ASV) scans.Here's what I just posted on my Web site:Whether you need to minimize your investment in information security and compliance, you’re in need of an easy way to discover the low-hanging vulnerabilities, or you need help certifying your ...
Continue Reading...Here's my latest information security content you may be interested in:How to forge an IT consulting careerHow to maintain IT shop efficiency when you're the last man standingDesktop security preparation for a new wave of Windows appsAs always, be sure to check out www.principlelogic.com/resources.html for all of my information security articles, podcasts, webcasts, screencasts and more....
Continue Reading...I recently wrote about How to maintain IT shop efficiency when you're the last man standing (which reminds me I forgot to post this on my new content updates!).Well, here are some more tips that Linda Tucci with SearchCIO.com just wrote about.So there you go...two reading assignments. :-)...
Continue Reading...Here's my latest information security content - more from the queue coming soon...just waiting for it to be published.Here's a webcast I recorded for SearchCIO.com:Continuous Data Protection (CDP) Strategies for the EnterpriseHere are two whitepapers I wrote for Realtimepublishers.com on behalf of Credant:Navigate the Future of HIPAA ComplianceData Protection for the Evolving WorkforceAs always, be sure to check out www.principlelogic.com/resources.html for all of my information security articles, podcasts, webcasts, screencasts ...
Continue Reading...Here's my latest information security content for your perusal.For starters, here's an article I wrote for Security Technology Executive magazine:Social Engineering: The big risk no one's thinking aboutHere's an article I re-published for a local Atlanta site called TechLINKs:How's your information security culture?Here's a bit I wrote for SearchDataBackup.com:Data security concerns with online backup...and here's a podcast I recorded for SearchCompliance.com:The future of compliance policy managementAs always, be sure to ...
Continue Reading...I attended a local networking event here in town last week where a representative from AlienVault presented their open source security incident/event management tool called OSSIM. I had to endure a painful sales pitch (that wasn't supposed to be a sales pitch, mind you) and a simple-minded "use this product for all your needs" approach to information security...but the tool actually looks promising. It's a "free" way to pull together ...
Continue Reading...I've been approached a couple of times in the past few weeks regarding the "scanner" and "vulnerability management" vendors that are touting their all-in-one approach to security vulnerability assessments and compliance scans. The interest has been around PCI DSS and specifically Rapid7's solutions (apparently their marketing folks are doing a good job). There are other vendors coming into the space as well including a big one being announced at RSA ...
Continue Reading...