Here's my latest stuff....First off, here's an article I wrote for SearchEnterpriseDesktop.com:Using Sysinternals tools in security management scenarios (a follow-up to my previous Sysinternals article)...and a podcast I recorded for SearchCIO.comMobile data protection options for enterprise CIOs (transcript included!)Enjoy!Also, be sure to check out www.principlelogic.com/resources.html for all of my information security articles, podcasts, webcasts, screencasts and more....
Continue Reading...When writing a HIPAA-related whitepaper last week for the fine folks at Realtimepublishers.com (TONS of free papers and books on IT & security) I came across two good sites for calculating the cost of a data breach...VERY enlightening numbers from tools that have finally come of age. Keep these tools in mind when you're selling security and compliance to management (I know, it's sad you even have to): Becky Herold's ...
Continue Reading...I've learned the hard way and have since touted the benefits of automating as much as you can when it comes to IT and security management. Software licensing is no different. Here's an interesting story about a time-consuming costly software license audit from Microsoft and AutoDesk that could happen to any given organization at any given time. I suspect the outcome would've been much less painful had this gentleman been ...
Continue Reading...Here's an enlightening interview with a tech-savvy lawyer, Chris Wolf, regarding data breach laws. The question posed to Chris is: what would you advise companies when it comes to data breach?In a nutshell, his response is: Get ready in advance.The $64,000 question: Would you tell your corporate lawyer no to this?...
Continue Reading...Here's a Q&A I put together with the author of a great new book on Web security testing:Recipe for successful Web application security testingHere's a podcast I recorded for SearchEnterpriseDesktop.com:Security Policies for Windows Systems...and here's an article I was interviewed for SearchCIO-Midmarket.com that you may find interesting:SOA, SaaS and SOAP: CIOs drowning in sea of IT acronymsBe sure to check out www.principlelogic.com/resources.html for all of my information security articles, podcast ...
Continue Reading...I like the message in this post by my colleague, the one - the only Pete Lindstrom. When securing your network, apps, laptops, whatever, you don't have to have the best security - you just need to have better security than the other folks around you. It's like having a home alarm sign in your yard and while your neighbors don't. Which home is the average criminal going to go ...
Continue Reading...When out on my lunch break today I drove by the entrance to a manufacturing plant (a Fortune 500 global company) that had a sign that read "Safety is everyone's responsibility".I understand that protecting electronic bits and bytes isn't as critical as protecting human bodies but this sign made me think about information security and where it is on the radar of business leaders. The truth is that unless and ...
Continue Reading...Here's an interesting tidbit from the Atlanta InfraGard's CounterIntelligence Working Group web site reminding us that information security IS a business problem. Too many executives think this kind of stuff won't happen to them:"The Issue … Does your company have products or technology that someone might want to steal from you? ... If a new competitor suddenly sprang up in the marketplace with exact copies of your products and was ...
Continue Reading...Yesterday, the Cobb County government school system - the county where I make 99% of my retail purchases - had their wish fulfilled when voters passed to renew the current special purpose local option sales tax (SPLOST). This in a county where the government schools are wrought with fierce politics and wasteful spending. I know not only because of the stories I read but also because I've seen it first ...
Continue Reading...In watching the clips from Obama's Adult American Idol speech last night (I couldn't bear to watch it all live) I was reminded of previous bosses I've had and other people I've seen regarding their "support" of information security:Posturing and pandering and spouting out whatever makes people feel good is very, very easy.Just like certain people are good at manipulating others negatively for their own gains, anyone (Obama, McCain, your ...
Continue Reading...