• 02 Feb 2010

    What part of No Truck Crossing do you not understand?

    Check out this wild video of a train crash yesterday. It's a great example of the fact that just because you have a policy (i.e. the no truck crossing sign) doesn't mean that people will abide by (i.e. the dummy driver who probably thought "Aw, I can make this."). Some people just believe that they are exempt from certain things.Keep this in mind for your information security matters...you can't save ...

    Continue Reading...
  • 25 May 2009

    My latest security content

    Here's my latest information security content you may be interested in:How to forge an IT consulting careerHow to maintain IT shop efficiency when you're the last man standingDesktop security preparation for a new wave of Windows appsAs always, be sure to check out www.principlelogic.com/resources.html for all of my information security articles, podcasts, webcasts, screencasts and more....

    Continue Reading...
  • 04 May 2009

    You cannot legislate a result

    By now you probably know what I think about security policies. Well, I recently heard Herman Cain say that you cannot legislate a result (the war on achievement comes to mind here) but you can legislate a level playing field. What a great quote.Like I talked about here keep this in mind when creating/updating your security policies and keep this in mind when it comes to moving up and ahead ...

    Continue Reading...
  • 26 Mar 2009

    So, policies are important?

    I had the privilege and pleasure of having lunch with security maven - and policy king - Charles Cresson Wood last week while he was in town speaking at a show. Here's a good read I just came across on some more of his thoughts regarding what many think of as a drab subject that doesn't really matter in the grand scheme of things. It'll get you thinking...Maybe time for ...

    Continue Reading...
  • 20 Mar 2009

    How about enacting a policy to punish someone?

    Imagine if someone at work ticked you off and you had the ability to enact a new IT/security policy that only affected that person. Something like no more Internet access or pay-per-use fees for laptops or, say, complete oversight and scrutiny of the person's every action when they're using the computer.Sounds absurd doesn't it....Well, it is and so is this ridiculous new law our House passed yesterday that will tax ...

    Continue Reading...
  • 18 Feb 2009

    Great quote regarding laws and policies

    Here's something I just came across that reminded me of the cluster$*!@ that's usually created by people trying to put together security policies. It also reminds me of the ridiculous government growth plan (you've gotta read the stuff at this link) created by Obama - our American Idol."Laws are like sausages, it is better not to see them being made." - Otto von Bismarck, 1st Chancellor of the German Empire ...

    Continue Reading...
  • 02 Dec 2008

    My latest security content

    Here's a Q&A I put together with the author of a great new book on Web security testing:Recipe for successful Web application security testingHere's a podcast I recorded for SearchEnterpriseDesktop.com:Security Policies for Windows Systems...and here's an article I was interviewed for SearchCIO-Midmarket.com that you may find interesting:SOA, SaaS and SOAP: CIOs drowning in sea of IT acronymsBe sure to check out www.principlelogic.com/resources.html for all of my information security articles, podcast ...

    Continue Reading...
  • 28 Oct 2008

    My latest security content

    Here are two articles I wrote for SearchEnterpriseDesktop.com:Enhancing patch management with NAPUnauthenticated vs. authenticated security testing Here's an article I wrote for SearchSQLServer.com:New security features in SQL Server 2008 leave some work for you...and finally a podcast I just recorded for SearchEnterpriseDesktop.com:Security Policies for Windows SystemsBe sure to check out www.principlelogic.com/resources.html for all of my information security articles, podcast interviews, webcasts, screencasts and more....

    Continue Reading...
  • 26 Aug 2008

    Finally…someone gets their Web security policy right!

    When most companies claim Web "security" they tout SSL like I mentioned here. I've had trouble figuring out why the buck stops there...maybe because they're being written by people in marketing??Anyway, LinkedIn finally got it right. The security stipulation in their privacy policy goes beyond SSL:In order to secure your personal information, access to your data on LinkedIn is password-protected, and sensitive data (such as credit card information) is protected ...

    Continue Reading...
  • 21 Jul 2008

    What’s wrong with this picture…Circuit City?

    I just stumbled across this "file sharing" site featuring my book Hacking For Dummies...for free download of course. I know, I know, they're not doing anything illegal - they're just providing a way for people to share files. Yeah right. The interesting thing I noted was the "legitimate" companies advertising on the site. WOW...I'm sure the executives at Circuit City would be so proud to know that they're helping sponsor ...

    Continue Reading...