In my years performing independent network security assessments, one thing that has really stood out to me is the lack of network insight. Regardless of the size of the organization, the industry in which they operate, and the level of security maturity, in most cases, I see IT and security shops with very little:documentationinventoryconfiguration standardslogging and alerting outside of basic resource monitoringWhat this means – and what it can easily ...
Continue Reading...Check out the following information security management pieces I've written for Ziff Davis and IBM recently: If there’s a will with information security there will be a way Eight remarkable things you’re doing with security that you can make even betterDivulging sensitive info for a potential acquisition - good idea or bad?Formidable Threats and Minimal Visibility - A Troublesome CombinationWhen vendor security vulnerabilities become your own Additional information security content ...
Continue Reading...Here's a new guest blog post I wrote for AlgoSec (a Roswell, Georgia-based company with some really solid firewall management applications) where I talk about something near and dear to all of us in IT:Do you really understand your network?...it's more than just a sappy relationship. :-)By the way, in case you missed it, I wrote a whitepaper for AlgoSec recently that you may be interested in as well:Firewall Management: ...
Continue Reading...A couple of weeks ago, I had the privilege of speaking at the Information Week / Dark Reading Virtual Trade Show How Security Breaches Happen and What Your Organization Can Do About It.In my presentation How to Win the War Against Cybercrime, I apparently had a brain-cramp moment and said that I'm not seeing anybody with good file integrity monitoring. Um, duh, Kevin (as I smack myself in the face), ...
Continue Reading...