• 07 Jul 2009

    My latest security content

    I'm taking this week off but I've scheduled this post of three new articles I've written that you may be interested in:Networking to enhance your IT careerA compliance officer, secure network aren't enough for real complianceData retention policies and procedures for SMBsAs always, be sure to check out www.principlelogic.com/resources.html for all of my information security articles, podcasts, webcasts, screencasts and more....

    Continue Reading...
  • 22 Jun 2009

    Charles Schwab hard drive removed & then stolen

    Yet another one for the hall of shame list. You know how I am about it, I'm sure this hard drive was encrypted. ;-)...

    Continue Reading...
  • 22 Jun 2009

    Web application security – ignorance or idiocy?

    You've heard me rant about common management and developer views of Web security here and in the articles I write for TechTarget. Here's some third-party validation of my thoughts. Entertaining yet sad....

    Continue Reading...
  • 20 Jun 2009

    Time to teach kids about personal responsibility, and prison?

    Here's some insight into what children are doing online these days. Great example of the lack of parenting, discipline, personal responsibility, and ability to think long-term we have going in our society.On a side note, perhaps the "Psychologists have long known that when an attacker does not see their victim, the normal inhibitions that prevent us from doing wrong become much weaker" bit explains why we see so much road ...

    Continue Reading...
  • 16 Jun 2009

    Getting back to the basics – what’s it going to take?

    With all the worry about budgets and all the marketing hype over some of these fancy vendor security solutions, I still see so many simple/silly/stupid things related to IT that need to be fixed before a penny is ever spent or a single new technology is ever deployed. Things like: --Network shares sharing out entire drives full of sensitive files - accessible by anyone with just a basic network login ...

    Continue Reading...
  • 03 Jun 2009

    Secret list of nuclear sites released “by accident”

    Apparently our Imperial Federal Government can't even follow its own rules for information privacy and security. It was just announced that a secret list of nuclear sites was released "by accident".First of all, "accidents" are like "computer glitches" - there's almost always human error behind them. Do you see the irony here? How is heavily-regulated private industry to be expected to lock everything down when the very entity writing OUR ...

    Continue Reading...
  • 21 May 2009

    My CNN TV appearance – yet another mobile drive debacle

    CNN's Mike Ahlers and Elaine Quijano put together an intriguiging segment about a lost hard drive from the National Archives for The Situation Room with Wolf Blitzer television show I appeared on last night. The hyperlink goes to the actual article...the video hasn't been posted yet and they're telling me it may not be. I hope you had the chance to see it live last night. If it gets posted ...

    Continue Reading...
  • 20 May 2009

    I’m going to be on CNN at 5pm ET today

    I received a call from the producer of the CNN show The Situation Room With Wolf Blitzer today and ended up doing a TV interview. It's about the National Archive story that just came out regarding and external hard drive that recently went missing.Wonder if it was encrypted like I've ranted about here and elsewhere in the past? Probably not.It's going to be on in the 5pm ET hour on ...

    Continue Reading...
  • 19 May 2009

    I’ve been saying this for a while

    Apparently security researchers and Robert Abela with Acunetix agree with what I've been saying for a while: Web application firewalls aren't enough!Check out this post and the darkreading.com post it links to....

    Continue Reading...
  • 12 May 2009

    Secure code by force?

    The Senate Homeland Security Committee, in their infinite wisdom, prodded by SANS' Alan Paller apparently believe they can legislate secure software from IT vendors.That'd be like legislating more secure health records, and personal financial information, and so on. Oh wait, that has been done. And it's not working all that well as far as I can tell.That'd also be like legislating higher-quality cars. Ha! The Feds can work that out ...

    Continue Reading...