• 20 Mar 2009

    How about enacting a policy to punish someone?

    Imagine if someone at work ticked you off and you had the ability to enact a new IT/security policy that only affected that person. Something like no more Internet access or pay-per-use fees for laptops or, say, complete oversight and scrutiny of the person's every action when they're using the computer.Sounds absurd doesn't it....Well, it is and so is this ridiculous new law our House passed yesterday that will tax ...

    Continue Reading...
  • 16 Mar 2009

    Is not patching being negligent?

    Well, Microsoft's Roger Halbheer thinks so - at least related to the Conficker worm as discussed here. By and large I agree.Everything in business and everything in life depends on us making choices. We choose the behavior - in this case not applying a highly-critical patch - we choose the consequences....especially if it's an oversight because someone in IT was goofing off.With all the talk about the importance of patching ...

    Continue Reading...
  • 11 Mar 2009

    My deep thought of the year

    Relating to how people are set in their ways:Security problems change....people don't. Therein lies the problem. --Yours truly...

    Continue Reading...
  • 11 Mar 2009

    Linux admin = ego trip?

    I recently started writing for SearchEnterpriseLinux.com...My first bit was on a topic that no one seems to want to talk about: Linux security. Entitled Five common Linux security vulnerabilities you may be overlooking, the article currently has the lowest rating I've received on any article I've ever written for TechTarget dating back to 2002...Woohoo! You definitely can't win them all.Sure, the article's light - it was intended to be an ...

    Continue Reading...
  • 09 Mar 2009

    Great quote related to policies & compliance

    Thomas Bracket Reed said "One of the greatest delusions in the world is the hope that the evils in this world are to be cured by legislation".I see this belief in action over and over again with regards to security policies and all these regulations we're up against. Just because you have policies and just because someone in your organization thinks that the business is "compliant" with whatever law or ...

    Continue Reading...
  • 25 Feb 2009

    Great backup solution for laptops

    I haven't mentioned one of my favorite products lately but it deserves repeating. It's Acronis TrueImage Echo Workstation and it's a great way to backup those laptops that no one seems to be backing up. Seriously, from what I can tell in my work, if users aren't backing up their own laptops then no one is doing it. What a shame...what a gaping business continuity hole. [FYI: Acronis makes server ...

    Continue Reading...
  • 19 Feb 2009

    25 Most Dangerous Programming Errors???

    Check them out here. I like the concept of the Top 25...it certainly helps spread the word...but who are they kidding when they talk about the Top 25's "major" impacts?!The site claims:*Software buyers will be able to buy much safer software.*Programmers will have tools that consistently measure the security of the software they are writing.*Colleges will be able to teach secure coding more confidently.*Employers will be able to ensure they ...

    Continue Reading...
  • 18 Feb 2009

    Great quote regarding laws and policies

    Here's something I just came across that reminded me of the cluster$*!@ that's usually created by people trying to put together security policies. It also reminds me of the ridiculous government growth plan (you've gotta read the stuff at this link) created by Obama - our American Idol."Laws are like sausages, it is better not to see them being made." - Otto von Bismarck, 1st Chancellor of the German Empire ...

    Continue Reading...
  • 10 Feb 2009

    The ultimate irony?

    Looks like Kaspersky is the latest "victim" of a Web hack. Perhaps an example of focusing too much on one area of information security and not paying attention to the other things that matter??BTW, I just came across a site you may be interested in. It's kind of like the Privacyrights.org Chronology of Data Breaches...yet another way for us to keep up with what's going on out there - at ...

    Continue Reading...
  • 03 Feb 2009

    My latest security content

    Wow, it's been nearly a month since my last posting of security content. Lots of writing but slow publication cycles I suppose. First off, here's an article I wrote for SearchEnterpriseDesktop.com:How to strike a balance between Windows security and business needsHere's a webcast/podcast combo I presented for SearchMobileComputing.com and sponsored by Dell:Data Protection for the Mobile Workforce - webcastData Protection for the Mobile Workforce - podcastMuch more to come soon!In ...

    Continue Reading...