Over the years writing and speaking have proven very useful for marketing myself and establishing my credibility in the information security field. But you can't just write or speak abd expect everyone to all of a sudden know about you...You've got to keep your name out in front of people - in plain sight...all the time.If you work for yourself (or aspire to in the near future), you've got to ...
Continue Reading...Here are my information security articles from this week that you may be interested in. Locking Down Today's Data Centers Cracking passwords the Web application way Basic SQL Server security principles you can't afford to miss For all of my past information security tips and tricks be sure to check out www.principlelogic.com/resources.html. Enjoy!...
Continue Reading...Check out PGP's 'The 12 Threats of Christmas'...It's really well done and it'll make you think about security. Even better...it'll make you laugh.http://www.youtube.com/watch?v=PSRPGHyYq90 Merry Christmas!Yours Truly,Kevin...
Continue Reading...Based on yesterday's post regarding firewall best practices, I thought it made sense to go ahead and post the 'best practices' content here as well. This is straight out of my Firewall Best Practices document I just recently updated:Firewalls are not the end all, be all solution to information security. They are, however, a necessary component of an effective network security infrastructure. The following list is a set of reasonable ...
Continue Reading...I recently had someone contact me and ask about the change management item I list in my Firewall Best Practices document. This person's inquiry revolved around them trying to get management to adopt change management practices and the troubles associated with having to properly and realistically explain to management the risks involved of not having good practices. This person wanted to know if I could explain the risks involved when ...
Continue Reading...Here are my information security articles from this week that you may be interested in. Beyond Natural Disasters: Business continuity issues you haven't thought of before Find Windows vulnerabilities with a hex editor Why store sensitive data if you don't have to? For all of my past content be sure to check out www.principlelogic.com/resources.html. Enjoy!...
Continue Reading...I've been hearing a little sound bite on my local radio station of Hilary Clinton saying "I believe everyone -- every man, woman, and child -- should have quality, affordable health care in America. We should do it. We should do it, because, in this new economy, when people move jobs more than ever before, their health insurance should move with them." You can see the transcript on Hilary's Media ...
Continue Reading...Here's my one information security article from this week that you may be interested in. For all of my past content be sure to check out www.principlelogic.com/resources.html.The Fallacy of SSLEnjoy!...
Continue Reading...On a similar note regarding my previous post on the Omaha mall incident, apparently the mall has a policy against concealed weapons - and apparently (I haven't confirmed) there's a Nebraska state law backing such policies in private businesses in that state. This event not only shows how vulnerable we really are but it's also a classic case of stupid policies/laws such as this ONLY apply to law-abiding citizens.In the ...
Continue Reading...I was listening to Neal Boortz's radio talk show this morning about the tragedy that occurred at the Omaha mall yesterday. A caller brought up the old saying "When seconds count, the police are only minutes away." This made me think about all the organizations out there who don't have an IT-centric incident response plan - or at least don't have one that's adequate enough to respond to real security ...
Continue Reading...