• 14 Jan 2016

    Hacking For Dummies, 5th edition – Brand new and more of what it oughta be

    It's official - the 5th edition of my book Hacking For Dummies is out!Outside of the first edition that was written 13 years ago, this new edition has, by far, the most updates and improvements yet. All based on the mistakes I make and the things I learn in my hands-on work performing independent security vulnerability assessments and penetration tests, I feel like Hacking For Dummies has come of age.In ...

    Continue Reading...
  • 02 Dec 2015

    How effective is your security program? New content and, perhaps, some new ideas.

    Slow going on the posts lately - too busy writing for other websites! :-) So, here's some of my latest for you - this time on the subject of information security management and running an effective security program:Information security is not stagnant but dynamicThe mishandling sensitive data: Do you really know what you don’t know?Security Decision-Making: When Decisions Are Based on Fear Rather Than FactState of the Network study: How ...

    Continue Reading...
  • 16 Sep 2015

    My new content: Regulating security pros, network security, and locking down Windows

    Here are some recent pieces I've written on information security that you might be interested in:Why regulating information security professionals is a bad thingYour network versus the cloud – what’s more secure?Solving major security infrastructure issues around interoperabilitySoftware-defined security: The future of network security?The biggest obstacle to securing Windows Server 2012Hidden vulnerabilities on your IIS 8 serversTighten Windows 8.1 security in five simple steps As always, my other information security ...

    Continue Reading...
  • 23 Jun 2015

    HIPAA Security Rule compliance tips, advice, and resources

    There's a lot going on in the world of healthcare, including HIPAA compliance. This applies not only to healthcare providers, insurance companies, and the like but also any business and subcontractor that does business in this space.If you or someone you know falls under this umbrella, here are a few things I've written over the past several months that can help: What Security Professionals Need to Know about HIPAA‘Yes, HIPAA ...

    Continue Reading...
  • 11 Jun 2015

    Great quote regarding people who are unable/unwilling to change

    Here's an excellent quote about business execs I just came across from management expert, Peter Drucker. It could certainly apply to IT and security professionals just the same:"The most common cause of executive failure is inability or unwillingness to change with the demands of a new position. The executive who keeps on doing what he has done successfully before is almost bound to fail."...in other words, if you keep doing ...

    Continue Reading...
  • 08 Jun 2015

    My latest information security content: truly *managing* your security program

    Check out the following information security management pieces I've written for Ziff Davis and IBM recently: If there’s a will with information security there will be a way  Eight remarkable things you’re doing with security that you can make even betterDivulging sensitive info for a potential acquisition - good idea or bad?Formidable Threats and Minimal Visibility - A Troublesome CombinationWhen vendor security vulnerabilities become your own Additional information security content ...

    Continue Reading...
  • 29 May 2015

    What you (really) need to know about esophageal manometry

    Aside from my typical computer security-related blog posts I thought I’d branch out and share something completely unrelated in hopes it can benefit others. Recently, I had the opportunity to endure the most difficult thing I’ve ever experienced as a forty-something male: esophageal manometry. It’s performed on patients suffering from gastroesophageal reflux disease (GERD). In short, the medical professional sticks one of these ~1/2" thick torture tubes up one of ...

    Continue Reading...
  • 15 Apr 2015

    Don’t get blinded by the “small stuff” that’s hard to notice

    One of the core challenges you face in information security is getting so caught up in the minutiae of your network environment and day-to-day work that you end up not being able to see the bigger picture: what's really going on, what really needs attention, and what really matters. I've been writing about this for over a decade and I've yet to stop spreading the word...it's just too important a ...

    Continue Reading...
  • 07 Apr 2015

    A core reason why security challenges go unresolved

    Constantly dealing with information security issues in your organization? It's really about dealing with management, peers, and subordinates. Here's some motivation:"The ability to deal with people is as purchasable a commodity as sugar of coffee, and I will pay more for that ability than for any other under the sun." -John D. Rockefeller If you're in search of other ideas on how to get (and keep) people on board with ...

    Continue Reading...
  • 10 Mar 2015

    Using Checkmarx CxSuite to outline “the rest of the story” regarding application security

    When it comes to Web application and mobile app security, can you honestly say you know where everything stands...as American radio personality Paul Harvey used to proclaim -  the rest of the story?   You can run Web vulnerability scans, perform manual mobile app analysis, and the most in-depth penetration testing possible. You can look at things from the perspectives of unauthenticated attackers, trusted users, and all the angles in between ...

    Continue Reading...