• 18 Feb 2013

    Self-delusion + infosec= foolishness

    I thought this quote from Ronald Reagan was quite fitting for President's Day:"If history teaches anything, it teaches that self-delusion in the face of unpleasant facts is folly."...

    Continue Reading...
  • 12 Feb 2013

    Mobile app security testing – are you checking for all the flaws?

    I plan to write a related post soon on my mobile app security assessments. In the meantime, I wanted to share a tool with you that plays a key role in mobile app security: Checkmarx CxDeveloper (or perhaps more appropriately called CxSuite).If you're a developer, QA professional, security manager, or IT generalist, this is a good tool to have for all of those gotta-have-now apps that everyone is throwing together ...

    Continue Reading...
  • 06 Feb 2013

    Reactive security, eh? How’s that workin’ for ya?

    Every time I browse the Chronology of Data Breaches and read the headlines coming out from Dark Reading, threatpost, and the like, I can't help but shake my head. What is it really going to take to get people - mostly management, but some in IT - to fix the stupid, silly, low-hanging fruit that's plaguing so many networks today...? Well, here's a new piece I wrote for the nice ...

    Continue Reading...
  • 30 Jan 2013

    What’s your communication style?

    Great IT & infosec-related quote:"Wise men talk because they have something to say; fools, because they have to say something." -PlatoGood communication is arguably the most important factor for success....

    Continue Reading...
  • 29 Jan 2013

    Introducing the brand new Hacking For Dummies, 4th edition

    Well, it's here...the fourth edition of my book Hacking For Dummies is officially available today!Starting summer of 2012 and ending just before Christmas, I put in over 200 hours of blood, sweat, tears, and occasional cussing into this edition...more than any previous updates to the book. That said, my savvy technical editor, Peter Davis, and the wonderful editors at Wiley, Becky Huehls, Virginia Sanders, and Amy Fandrei were the real ...

    Continue Reading...
  • 21 Jan 2013

    Student information systems rife with security flaws

    Here's an interesting story from Slashdot today about a college student being expelled after pointing out flaws in his college's student information system.What he's seeing is no surprise. Starting with my days working for IBM's EduQuest division, for the past 20 years or so I've seen numerous K-12 and higher education student information systems chock full of security flaws. Stupid, silly security flaws like SQL injection, cross-site request forgery, URL ...

    Continue Reading...
  • 18 Jan 2013

    Dear Neal Boortz,

    With this being your final day on the air, I thought it would be appropriate for me to send you a note of thanks for all you've done for me the past 20 years or so that I've listened to your radio show. Rather than wax poetic in paragraph format I want to list out the things you've taught me that have greatly enhanced my life.Neal, you have taught me:To ...

    Continue Reading...
  • 14 Jan 2013

    How are you getting your points across?

    Here's a great point to remember regarding information security:"A mediocre person tells. A good person explains. A superior person demonstrates. A great person inspires others to see for themselves." -Harvey Mackay...

    Continue Reading...
  • 21 Dec 2012

    IT security careers, committees, and corruption

    Here are some new pieces I've written on IT and security leadership (or lack thereof). Enjoy!What to do when the CIO gets in the way of enterprise IT securityHow to form a functional enterprise IT security committeeUnderstanding management gets your IT department what it needsFive Concepts for IT Security SuccessAs always, check out principlelogic.com/resources for links to all of my information security whitepapers, podcasts, webcasts, books, and more....

    Continue Reading...
  • 09 Dec 2012

    What do credibility, BYOD, & mobile security have in common?

    They're the topics of three new pieces I've written!I can't believe I've been writing more than ever lately but haven't kept up with my posts accordingly. In the interest of catching up, here's some new content I've written on mobile security, BYOD, and IT/security careers:Credibility is the cornerstone of your careerAs BYOD, cloud change networking, VPN management still indispensibleTop 10 reasons we have our heads in the sand over mobile ...

    Continue Reading...