• 23 Feb 2009

    Want to know what a breach is going to cost?

    When writing a HIPAA-related whitepaper last week for the fine folks at Realtimepublishers.com (TONS of free papers and books on IT & security) I came across two good sites for calculating the cost of a data breach...VERY enlightening numbers from tools that have finally come of age. Keep these tools in mind when you're selling security and compliance to management (I know, it's sad you even have to): Becky Herold's ...

    Continue Reading...
  • 12 Jan 2009

    My latest security content

    Welcome to the first real (i.e. productive) week back in the New Year. These have been stacking up a bit while I've been out fighting this sinus junk that everyone seems to have. So here you go.First off, here's an article I wrote for SearchSoftwareQuality.com:Five predictions for Web security trends and changes for 2009And here's an article I wrote for SearchEnterpriseDesktop.com:Building credibility and getting others on your sideFinally, here's a ...

    Continue Reading...
  • 20 Oct 2008

    Question posed to me about IT operations not being on board with security

    Here's an interesting question someone asked me recently regarding some in-fighting about security along with my brief response on how to fix the problem. I see this ALL the time!:"I work in a company as the sole information security analyst. My job is to identify risks, set policy, and audit our IT environment against the policies I wrote. I am currently working with IT operations staff on mitigating risks based ...

    Continue Reading...
  • 25 Aug 2008

    My security content from last week – chock full of good stuff

    OK - I finally got the links to my latest material. Here are some articles about getting management on board with security (one of the hardest things we face) , controlling unstructured information, Web apps, storage, and more that you may be interested in checking out:Making the Business Case for Information SecurityDocument Security - Protecting sensitive information both inside and outside of the firewall7 Essentials for Selecting an IT IntegratorWeb ...

    Continue Reading...
  • 30 Apr 2008

    Small business owners take note – security affects you too!

    In fact, the threats and vulnerabilities we're up against don't discriminate. Size doesn't matter. Here's a good read on this if you're trying to find some ammo to get management on your side and show that security affects all businesses - large and small.Here's another story about how credit card thieves are targeting small businesses.Oh, one more thing - one of the greatest bits of ammo is the Privacy Rights ...

    Continue Reading...
  • 03 Dec 2007

    My articles from this week

    Here are my recent information security articles you may be interested in. For all of my past content be sure to check out www.principlelogic.com/resources.html. How to get developers to buy into software security Cheap Microsoft licenses for security pros: the Microsoft Action Pack Mobile security: Setting responsible goals Mobile security: Top oversights You may need to perform a quick third-party registration to access some of them. Enjoy!...

    Continue Reading...